
Sign up to save your podcasts
Or


In this episode, host Aaron Crow engages in a riveting conversation with Anusha Iyer, the CEO and founder of Corsha, a Washington, D.C.-based cybersecurity company. With over 25 years of experience in the cybersecurity space and a newfound interest in operational technology (OT), Anusha shares insights into her company's innovative approach to identity and access management for machines.
The discussion covers key topics such as the convergence of IT and OT, the essential need to understand machine-to-machine communication, and the revolutionary potential of machine identity and multi-factor authentication (MFA) in securing industrial environments. Aaron and Anusha explore practical strategies for bridging IT and OT gaps and highlight real-world examples of implementing zero-trust principles.
This episode is a treasure trove of knowledge for cybersecurity professionals, OT engineers, and tech enthusiasts alike. It emphasizes how modern security measures can transform and protect critical infrastructure. Tune in to gain valuable insights into the future of OT cybersecurity and the importance of embracing comprehensive security measures.
Key Moments:
06:16 Machine Identity in OT Environments
08:40 Machine MFA for Secure Access
10:23 Understanding Secure Endpoint Communication
14:07 Cybersecurity vs. Safety Concerns
17:37 Achieving Zero Trust in Network Security
20:50 Overcoming Cloud Security Fears
26:10 Tech Implementation and Management Challenges
31:54 Complex Architecture: Costly and Complex
36:05 Understanding System Data Flow Benefits
40:36 Technology Deployment Before Cybersecurity Era
47:50 Simplifying Machine Implementation Benefits
51:19 Manual System Updates Challenges
51:58 Balancing IT and OT Efficiency
About the guest :
Anusha Iyer is the Founder and CEO of Corsha - a leader in identity and access management for operational systems and critical infrastructure. With over 20 years in cybersecurity, Anusha is passionate about demystifying cyber and security, making it accessible, easy to adopt, and self-assuring.
Reach out to Anusha at [email protected] if you want to talk OT and Cyber and how to use machine identity in your industrial networks to unlock secure automation.
Find out more about Corsha and request a demo here: https://corsha.com/request-a-demo
Connect With Aaron Crow:
Learn more about PrOTect IT All:
To be a guest or suggest a guest/episode, please email us at [email protected]
Please leave us a review on Apple/Spotify Podcasts:
Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4
By Anton Shipulin / Listen Notes4.5
88 ratings
In this episode, host Aaron Crow engages in a riveting conversation with Anusha Iyer, the CEO and founder of Corsha, a Washington, D.C.-based cybersecurity company. With over 25 years of experience in the cybersecurity space and a newfound interest in operational technology (OT), Anusha shares insights into her company's innovative approach to identity and access management for machines.
The discussion covers key topics such as the convergence of IT and OT, the essential need to understand machine-to-machine communication, and the revolutionary potential of machine identity and multi-factor authentication (MFA) in securing industrial environments. Aaron and Anusha explore practical strategies for bridging IT and OT gaps and highlight real-world examples of implementing zero-trust principles.
This episode is a treasure trove of knowledge for cybersecurity professionals, OT engineers, and tech enthusiasts alike. It emphasizes how modern security measures can transform and protect critical infrastructure. Tune in to gain valuable insights into the future of OT cybersecurity and the importance of embracing comprehensive security measures.
Key Moments:
06:16 Machine Identity in OT Environments
08:40 Machine MFA for Secure Access
10:23 Understanding Secure Endpoint Communication
14:07 Cybersecurity vs. Safety Concerns
17:37 Achieving Zero Trust in Network Security
20:50 Overcoming Cloud Security Fears
26:10 Tech Implementation and Management Challenges
31:54 Complex Architecture: Costly and Complex
36:05 Understanding System Data Flow Benefits
40:36 Technology Deployment Before Cybersecurity Era
47:50 Simplifying Machine Implementation Benefits
51:19 Manual System Updates Challenges
51:58 Balancing IT and OT Efficiency
About the guest :
Anusha Iyer is the Founder and CEO of Corsha - a leader in identity and access management for operational systems and critical infrastructure. With over 20 years in cybersecurity, Anusha is passionate about demystifying cyber and security, making it accessible, easy to adopt, and self-assuring.
Reach out to Anusha at [email protected] if you want to talk OT and Cyber and how to use machine identity in your industrial networks to unlock secure automation.
Find out more about Corsha and request a demo here: https://corsha.com/request-a-demo
Connect With Aaron Crow:
Learn more about PrOTect IT All:
To be a guest or suggest a guest/episode, please email us at [email protected]
Please leave us a review on Apple/Spotify Podcasts:
Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124
Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4

78,268 Listeners

2,004 Listeners

371 Listeners

374 Listeners

637 Listeners

1,022 Listeners

31 Listeners

322 Listeners

112,584 Listeners

8,014 Listeners

174 Listeners

314 Listeners

113 Listeners

137 Listeners