Protecting Operational Technology with zero-trust

0 Views· 09/11/23
Tech means Business
Tech means Business
0 Subscribers
0

Among the most alarming attack vectors that cybercriminals can target are the hardware and software used in industrial settings to monitor and control billions of devices, processes and critical infrastructure. These include control sensors, power generation management, oil & gas refining management, cameras, switches, machinery, and fire systems to cite a few examples. These operational technology (OT) instances are mainly designed to interact with specific equipment, and they don't always come with sufficient security or update mechanisms built-in to withstand concerted attacks.Our guest on this episode of the Tech Means Business podcast, Nigel Tan, works for Delinea, a leading Privileged Access Management (PAM) solutions provider that can protect this layer of infrastructure, whether new or legacy.While endpoint protection is often not viable and network-layer security unsuitable, it's zero-trust and careful PAM that can make the difference between safe OT and an open door for hackers.Nigel is Delinea's Technical Director of Sales Engineering at Delinea for the Asia-Pacific, a battle-hardened professional who's been active in cybersecurity for many years. Together, we discuss the present situation, the potential for damage to critical national infrastructure and worse, the possibility that a cyber incursion can easily damage human lives, physicallyThere are ways and means, of course, to ameliorate the situation, which Nigel helps us discover as we check out Delinea's OT protection methods.Check out the Delinea website here:<br />https://delinea.comRead the company's blog on security, starting here:<br />https://delinea.com/blog/privi....leged-access-managem Tan of Delinea is here:<br />https://www.linkedin.com/in/nigel-t-bb4bba7/Joe Green's LinkedIn profile lives here:<br />https://www.linkedin.com/in/josephedwardgreen/

Show more

 0 Comments sort   Sort By


Up next