Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Industrial Cybersecurity Insider. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Industrial Cybersecurity Insider or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

When IT Security Meets OT Reality: Why One Size Doesn't Fit All

33:27
 
Share
 

Manage episode 517861703 series 3519015
Content provided by Industrial Cybersecurity Insider. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Industrial Cybersecurity Insider or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

What happens when IT cybersecurity practices collide with OT operational realities? In this episode, Jim and Dino expose the costly mistakes organizations make when applying IT security playbooks to manufacturing environments.

Discover why zero trust architectures can halt production, how shadow IT thrives on every plant floor, and why remote access policies designed for corporate networks fail in industrial settings.

Learn the critical importance of OT-tailored asset inventories, the need for IT/OT collaboration, and why digital safety must be treated with the same urgency as physical safety.

If you're struggling to bridge the gap between IT security mandates and OT operational needs—or if you've ever watched a well-intentioned security policy bring production to a halt—this episode is your roadmap to getting it right.

Chapters:

  • (00:00:00) - Introduction and Episode Overview
  • (00:01:19) - IT vs OT Security Mindsets
  • (00:02:03) - Zero Trust Challenges in OT Environments
  • (00:05:12) - Remote Access and Change Management Conflicts
  • (00:09:00) - Who Should Learn from Whom: IT or OT?
  • (00:10:23) - Asset Inventory: What OT Engineers Don't Know
  • (00:15:00) - Process Integrity and Operational Value
  • (00:21:57) - Shadow IT: The Backdoors Nobody Talks About
  • (00:26:00) - Designing Security Into New Equipment
  • (00:28:00) - Digital Safety vs Physical Safety

Links And Resources:


Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

  continue reading

99 episodes

Artwork
iconShare
 
Manage episode 517861703 series 3519015
Content provided by Industrial Cybersecurity Insider. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Industrial Cybersecurity Insider or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

What happens when IT cybersecurity practices collide with OT operational realities? In this episode, Jim and Dino expose the costly mistakes organizations make when applying IT security playbooks to manufacturing environments.

Discover why zero trust architectures can halt production, how shadow IT thrives on every plant floor, and why remote access policies designed for corporate networks fail in industrial settings.

Learn the critical importance of OT-tailored asset inventories, the need for IT/OT collaboration, and why digital safety must be treated with the same urgency as physical safety.

If you're struggling to bridge the gap between IT security mandates and OT operational needs—or if you've ever watched a well-intentioned security policy bring production to a halt—this episode is your roadmap to getting it right.

Chapters:

  • (00:00:00) - Introduction and Episode Overview
  • (00:01:19) - IT vs OT Security Mindsets
  • (00:02:03) - Zero Trust Challenges in OT Environments
  • (00:05:12) - Remote Access and Change Management Conflicts
  • (00:09:00) - Who Should Learn from Whom: IT or OT?
  • (00:10:23) - Asset Inventory: What OT Engineers Don't Know
  • (00:15:00) - Process Integrity and Operational Value
  • (00:21:57) - Shadow IT: The Backdoors Nobody Talks About
  • (00:26:00) - Designing Security Into New Equipment
  • (00:28:00) - Digital Safety vs Physical Safety

Links And Resources:


Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!

  continue reading

99 episodes

모든 에피소드

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play