Security Breach

Avoiding the Ostrich Approach


Listen Later

I’m always tempted to start out each episode by talking about a problem, and then setting up our guest as the solution to that problem. It’s formulaic and a bit redundant, but it’s also effective. So I’ll apologize in advance because I’m about to do that very thing again. 

The difference is that Howard Grimes, the CEO of the Cybersecurity Manufacturing Innovation Institute (CyManII) is looking to help provide a lot of solutions for manufacturers. As we discuss workforce challenges, secure-by-design, an evolving threat landscape and the ongoing struggles with legacy OT infrastructure, I’ll challenge you to find something that the Institute couldn’t help you and your organization jumpstart, solve or streamline.

Watch/listen as we discuss:

  • The most significant vulnerabilities still impacting manufacturing.
  • Why the industrial sector struggles to find OT cybersecurity specialists, and strategies that are helping to fill this gap.
  • The growing prominence of secure-by-design and how the responsibilities for these strategies are shifting.
  • The areas where legacy OT technology are hampering cybersecurity efforts the most.
  • Why the "Ostrich Approach" can no longer be tolerated.
  • The new focal points of attackers and how these are shifting based on hacker resources.

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

Digital Disruption with Geoff Nielson
Discover how technology is reshaping our lives and livelihoods.

Listen on: Apple Podcasts   Spotify

Inspiring Tech Leaders - The Technology Podcast
Interviews with Tech Leaders and insights on the latest emerging technology trends.

Listen on: Apple Podcasts   Spotify

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected].

...more
View all episodesView all episodes
Download on the App Store

Security BreachBy Eric Sorensen