Podchaser Logo
Home
EP 28: Why Mapping IT Security to OT Networks Doesn’t Always Work

EP 28: Why Mapping IT Security to OT Networks Doesn’t Always Work

Released Tuesday, 16th January 2024
Good episode? Give it some love!
EP 28: Why Mapping IT Security to OT Networks Doesn’t Always Work

EP 28: Why Mapping IT Security to OT Networks Doesn’t Always Work

EP 28: Why Mapping IT Security to OT Networks Doesn’t Always Work

EP 28: Why Mapping IT Security to OT Networks Doesn’t Always Work

Tuesday, 16th January 2024
Good episode? Give it some love!
Rate Episode

The Purdue Model used in OT is essentially network security from the 1990s. New threats and new tech however required us to rethink that on the network side so how do we bring that new thinking to work with legacy OT systems? John Taylor of Versa Networks explains how there's a lot of implicit trust in the IoT and OT devices themselves, yet they don't have antivirus. Or firewalls. Worse, you're basically depending on the manufacturer of that device to provide security updates if necessary, and oftentimes they don't. Perhaps it’s time for a new approach such as SASE or secure access service edge.

Show More
Rate

Join Podchaser to...

  • Rate podcasts and episodes
  • Follow podcasts and creators
  • Create podcast and episode lists
  • & much more

Episode Tags

Do you host or manage this podcast?
Claim and edit this page to your liking.
,

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features