@BEERISAC: OT/ICS Security Podcast Playlist

Bridging IT and OT: Exploring Machine Identity and MFA in Cybersecurity with Anusha Iyer


Listen Later

Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)
Episode: Bridging IT and OT: Exploring Machine Identity and MFA in Cybersecurity with Anusha Iyer
Pub date: 2025-01-27

Get Podcast Transcript →
powered by Listen411 - fast audio-to-text and summarization



In this episode, host Aaron Crow engages in a riveting conversation with Anusha Iyer, the CEO and founder of Corsha, a Washington, D.C.-based cybersecurity company. With over 25 years of experience in the cybersecurity space and a newfound interest in operational technology (OT), Anusha shares insights into her company's innovative approach to identity and access management for machines.

The discussion covers key topics such as the convergence of IT and OT, the essential need to understand machine-to-machine communication, and the revolutionary potential of machine identity and multi-factor authentication (MFA) in securing industrial environments. Aaron and Anusha explore practical strategies for bridging IT and OT gaps and highlight real-world examples of implementing zero-trust principles.

This episode is a treasure trove of knowledge for cybersecurity professionals, OT engineers, and tech enthusiasts alike. It emphasizes how modern security measures can transform and protect critical infrastructure. Tune in to gain valuable insights into the future of OT cybersecurity and the importance of embracing comprehensive security measures.



Key Moments: 

 

06:16 Machine Identity in OT Environments

08:40 Machine MFA for Secure Access

10:23 Understanding Secure Endpoint Communication

14:07 Cybersecurity vs. Safety Concerns

17:37 Achieving Zero Trust in Network Security

20:50 Overcoming Cloud Security Fears

26:10 Tech Implementation and Management Challenges

31:54 Complex Architecture: Costly and Complex

36:05 Understanding System Data Flow Benefits

40:36 Technology Deployment Before Cybersecurity Era

47:50 Simplifying Machine Implementation Benefits

51:19 Manual System Updates Challenges

51:58 Balancing IT and OT Efficiency

 

About the guest : 

 

Anusha Iyer is the Founder and CEO of Corsha - a leader in identity and access management for operational systems and critical infrastructure. With over 20 years in cybersecurity, Anusha is passionate about demystifying cyber and security, making it accessible, easy to adopt, and self-assuring.

Reach out to Anusha at [email protected] if you want to talk OT and Cyber and how to use machine identity in your industrial networks to unlock secure automation.

 

Find out more about Corsha and request a demo here: https://corsha.com/request-a-demo

Connect With Aaron Crow:

  • Website: www.corvosec.com 
  • LinkedIn: https://www.linkedin.com/in/aaronccrow
  •  

    Learn more about PrOTect IT All:

    • Website: https://protectitall.co/ 
    • X: https://twitter.com/protectitall 
    • YouTube: https://www.youtube.com/@PrOTectITAll 
    • FaceBook:  https://facebook.com/protectitallpodcast 
    •  

      To be a guest or suggest a guest/episode, please email us at [email protected]



      Please leave us a review on Apple/Spotify Podcasts:

      Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124

      Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4



      The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
      ...more
      View all episodesView all episodes
      Download on the App Store

      @BEERISAC: OT/ICS Security Podcast PlaylistBy Anton Shipulin / Listen Notes

      • 4.5
      • 4.5
      • 4.5
      • 4.5
      • 4.5

      4.5

      8 ratings


      More shows like @BEERISAC: OT/ICS Security Podcast Playlist

      View all
      Stuff You Should Know by iHeartPodcasts

      Stuff You Should Know

      78,268 Listeners

      Security Now (Audio) by TWiT

      Security Now (Audio)

      2,004 Listeners

      Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

      Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

      371 Listeners

      Risky Business by Patrick Gray

      Risky Business

      374 Listeners

      SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

      SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

      637 Listeners

      CyberWire Daily by N2K Networks

      CyberWire Daily

      1,022 Listeners

      The Defender's Advantage Podcast by Mandiant

      The Defender's Advantage Podcast

      31 Listeners

      Smashing Security by Graham Cluley

      Smashing Security

      322 Listeners

      The Daily by The New York Times

      The Daily

      112,584 Listeners

      Darknet Diaries by Jack Rhysider

      Darknet Diaries

      8,014 Listeners

      Cybersecurity Today by Jim Love

      Cybersecurity Today

      174 Listeners

      Hacking Humans by N2K Networks

      Hacking Humans

      314 Listeners

      Dr. James Beckett: Sports Card Insights by Dr. James Beckett

      Dr. James Beckett: Sports Card Insights

      113 Listeners

      Cyber Security Headlines by CISO Series

      Cyber Security Headlines

      137 Listeners