@BEERISAC: OT/ICS Security Podcast Playlist

Bridging IT and OT: Exploring Machine Identity and MFA in Cybersecurity with Anusha Iyer


Listen Later

Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)
Episode: Bridging IT and OT: Exploring Machine Identity and MFA in Cybersecurity with Anusha Iyer
Pub date: 2025-01-27

Get Podcast Transcript →
powered by Listen411 - fast audio-to-text and summarization



In this episode, host Aaron Crow engages in a riveting conversation with Anusha Iyer, the CEO and founder of Corsha, a Washington, D.C.-based cybersecurity company. With over 25 years of experience in the cybersecurity space and a newfound interest in operational technology (OT), Anusha shares insights into her company's innovative approach to identity and access management for machines.

The discussion covers key topics such as the convergence of IT and OT, the essential need to understand machine-to-machine communication, and the revolutionary potential of machine identity and multi-factor authentication (MFA) in securing industrial environments. Aaron and Anusha explore practical strategies for bridging IT and OT gaps and highlight real-world examples of implementing zero-trust principles.

This episode is a treasure trove of knowledge for cybersecurity professionals, OT engineers, and tech enthusiasts alike. It emphasizes how modern security measures can transform and protect critical infrastructure. Tune in to gain valuable insights into the future of OT cybersecurity and the importance of embracing comprehensive security measures.



Key Moments: 

 

06:16 Machine Identity in OT Environments

08:40 Machine MFA for Secure Access

10:23 Understanding Secure Endpoint Communication

14:07 Cybersecurity vs. Safety Concerns

17:37 Achieving Zero Trust in Network Security

20:50 Overcoming Cloud Security Fears

26:10 Tech Implementation and Management Challenges

31:54 Complex Architecture: Costly and Complex

36:05 Understanding System Data Flow Benefits

40:36 Technology Deployment Before Cybersecurity Era

47:50 Simplifying Machine Implementation Benefits

51:19 Manual System Updates Challenges

51:58 Balancing IT and OT Efficiency

 

About the guest : 

 

Anusha Iyer is the Founder and CEO of Corsha - a leader in identity and access management for operational systems and critical infrastructure. With over 20 years in cybersecurity, Anusha is passionate about demystifying cyber and security, making it accessible, easy to adopt, and self-assuring.

Reach out to Anusha at [email protected] if you want to talk OT and Cyber and how to use machine identity in your industrial networks to unlock secure automation.

 

Find out more about Corsha and request a demo here: https://corsha.com/request-a-demo

Connect With Aaron Crow:

  • Website: www.corvosec.com 
  • LinkedIn: https://www.linkedin.com/in/aaronccrow
  •  

    Learn more about PrOTect IT All:

    • Website: https://protectitall.co/ 
    • X: https://twitter.com/protectitall 
    • YouTube: https://www.youtube.com/@PrOTectITAll 
    • FaceBook:  https://facebook.com/protectitallpodcast 
    •  

      To be a guest or suggest a guest/episode, please email us at [email protected]



      Please leave us a review on Apple/Spotify Podcasts:

      Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124

      Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4



      The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
      ...more
      View all episodesView all episodes
      Download on the App Store

      @BEERISAC: OT/ICS Security Podcast PlaylistBy Anton Shipulin / Listen Notes

      • 4.4
      • 4.4
      • 4.4
      • 4.4
      • 4.4

      4.4

      7 ratings


      More shows like @BEERISAC: OT/ICS Security Podcast Playlist

      View all
      Security Now (Audio) by TWiT

      Security Now (Audio)

      1,968 Listeners

      SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

      SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

      627 Listeners

      The Ben Shapiro Show by The Daily Wire

      The Ben Shapiro Show

      153,438 Listeners

      CyberWire Daily by N2K Networks

      CyberWire Daily

      1,003 Listeners

      Darknet Diaries by Jack Rhysider

      Darknet Diaries

      7,875 Listeners

      Cybersecurity Today by Jim Love

      Cybersecurity Today

      167 Listeners

      The Industrial Security Podcast by PI Media

      The Industrial Security Podcast

      20 Listeners

      Cyber Security Headlines by CISO Series

      Cyber Security Headlines

      129 Listeners

      Hack the Plant by Bryson Bort

      Hack the Plant

      25 Listeners

      Nexus: A Claroty Podcast by Claroty

      Nexus: A Claroty Podcast

      17 Listeners

      Error Code by Robert Vamosi

      Error Code

      9 Listeners

      HOU.SEC.CAST. by Michael Farnum and Sam Van Ryder

      HOU.SEC.CAST.

      7 Listeners