
Sign up to save your podcasts
Or
In this episode, host Aaron Crow engages in a riveting conversation with Anusha Iyer, the CEO and founder of Corsha, a Washington, D.C.-based cybersecurity company. With over 25 years of experience in the cybersecurity space and a newfound interest in operational technology (OT), Anusha shares insights into her company's innovative approach to identity and access management for machines.
The discussion covers key topics such as the convergence of IT and OT, the essential need to understand machine-to-machine communication, and the revolutionary potential of machine identity and multi-factor authentication (MFA) in securing industrial environments. Aaron and Anusha explore practical strategies for bridging IT and OT gaps and highlight real-world examples of implementing zero-trust principles.
This episode is a treasure trove of knowledge for cybersecurity professionals, OT engineers, and tech enthusiasts alike. It emphasizes how modern security measures can transform and protect critical infrastructure. Tune in to gain valuable insights into the future of OT cybersecurity and the importance of embracing comprehensive security measures.
Key Moments:
06:16 Machine Identity in OT Environments
08:40 Machine MFA for Secure Access
10:23 Understanding Secure Endpoint Communication
14:07 Cybersecurity vs. Safety Concerns
17:37 Achieving Zero Trust in Network Security
20:50 Overcoming Cloud Security Fears
26:10 Tech Implementation and Management Challenges
31:54 Complex Architecture: Costly and Complex
36:05 Understanding System Data Flow Benefits
40:36 Technology Deployment Before Cybersecurity Era
47:50 Simplifying Machine Implementation Benefits
51:19 Manual System Updates Challenges
51:58 Balancing IT and OT Efficiency
About the guest :
Anusha Iyer is the Founder and CEO of Corsha - a leader in identity and access management for operational systems and critical infrastructure. With over 20 years in cybersecurity, Anusha is passionate about demystifying cyber and security, making it accessible, easy to adopt, and self-assuring.
Reach out to Anusha at [email protected] if you want to talk OT and Cyber and how to use machine identity in your industrial networks to unlock secure automation.
Find out more about Corsha and request a demo here: https://corsha.com/request-a-demo
Connect With Aaron Crow:
Learn more about PrOTect IT All:
To be a guest or suggest a guest/episode, please email us at [email protected]
Please leave us a review on Apple/Spotify Podcasts:
Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4
5
77 ratings
In this episode, host Aaron Crow engages in a riveting conversation with Anusha Iyer, the CEO and founder of Corsha, a Washington, D.C.-based cybersecurity company. With over 25 years of experience in the cybersecurity space and a newfound interest in operational technology (OT), Anusha shares insights into her company's innovative approach to identity and access management for machines.
The discussion covers key topics such as the convergence of IT and OT, the essential need to understand machine-to-machine communication, and the revolutionary potential of machine identity and multi-factor authentication (MFA) in securing industrial environments. Aaron and Anusha explore practical strategies for bridging IT and OT gaps and highlight real-world examples of implementing zero-trust principles.
This episode is a treasure trove of knowledge for cybersecurity professionals, OT engineers, and tech enthusiasts alike. It emphasizes how modern security measures can transform and protect critical infrastructure. Tune in to gain valuable insights into the future of OT cybersecurity and the importance of embracing comprehensive security measures.
Key Moments:
06:16 Machine Identity in OT Environments
08:40 Machine MFA for Secure Access
10:23 Understanding Secure Endpoint Communication
14:07 Cybersecurity vs. Safety Concerns
17:37 Achieving Zero Trust in Network Security
20:50 Overcoming Cloud Security Fears
26:10 Tech Implementation and Management Challenges
31:54 Complex Architecture: Costly and Complex
36:05 Understanding System Data Flow Benefits
40:36 Technology Deployment Before Cybersecurity Era
47:50 Simplifying Machine Implementation Benefits
51:19 Manual System Updates Challenges
51:58 Balancing IT and OT Efficiency
About the guest :
Anusha Iyer is the Founder and CEO of Corsha - a leader in identity and access management for operational systems and critical infrastructure. With over 20 years in cybersecurity, Anusha is passionate about demystifying cyber and security, making it accessible, easy to adopt, and self-assuring.
Reach out to Anusha at [email protected] if you want to talk OT and Cyber and how to use machine identity in your industrial networks to unlock secure automation.
Find out more about Corsha and request a demo here: https://corsha.com/request-a-demo
Connect With Aaron Crow:
Learn more about PrOTect IT All:
To be a guest or suggest a guest/episode, please email us at [email protected]
Please leave us a review on Apple/Spotify Podcasts:
Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4
224,206 Listeners
1,003 Listeners
7,876 Listeners
90 Listeners
129 Listeners
25 Listeners