@BEERISAC: OT/ICS Security Podcast Playlist

Bridging the Security Gap: How HERA Transforms Remote Access in Industrial Environments with Andrew Ginter


Listen Later

Podcast: PrOTect It All (LS 25 · TOP 10% what is this?)
Episode: Bridging the Security Gap: How HERA Transforms Remote Access in Industrial Environments with Andrew Ginter
Pub date: 2024-07-22

Get Podcast Transcript →
powered by Listen411 - fast audio-to-text and summarization



Welcome back to *Protect It All*! In Episode 17, host Aaron Crow is joined by Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, to dive deep into secure remote access for Operational Technology (OT) systems. They explore the cutting-edge HERA (Hardware Enforced Remote Access) technology, which offers a revolutionary approach to remote control via TPM hardware, unidirectional gateways, and stringent encryption protocols. 

This episode covers everything from the critical need for robust security in high-stakes environments like wind farms and manufacturing to the dangers of supply chain vulnerabilities to the broader implications for industries dependent on remote operations.

Ginter sheds light on the limitations of software-based solutions and the strategic advantages of hardware-enforced security, while also discussing his book "Engineering Great OT Security" and the latest initiatives in cyber-informed engineering. 

Tune in to learn how organizations can remain competitive, reduce costs, and stay secure in an increasingly interconnected industrial world. This enlightening discussion could change the way you think about remote access!

 

Key Moments: 

 

05:53 Spectrum of consequence in remote access explained.

07:55 Security flaws in remote access systems.

10:23 Remote access is often overlooked by many.

15:11 Supply chain vulnerability due to cloud connectivity.

17:33 Hardware-enforced remote access, HERA, fills the security spectrum.

20:52 Custom ASIC with 1M transistors for encryption.

25:55 Ways to exploit network security vulnerabilities discussed.

26:35 Exploiting technology to send unauthorized messages.

32:50 Benefits of centralizing engineering teams in businesses.

34:18 Competing in the international market with unique services.

39:31 Understanding the implications before implementing technology is crucial.

40:30 Uncertainty about large number, risk opportunity tap.

43:50 Firewall controls data flow and is potentially misconfigurable.

 

About the guest : 

 

At Waterfall Security, Andrew leads a team of experts working with the world's most secure industrial sites. He is the author of three books on industrial security, co-author of the IIoT SF and the UITP Guide to CyberSecurity in Tendering, and co-host of the Industrial Security Podcast.

Links:

https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/hardware-enforced-remote-access-hera-under-the-hood/

LinkedIn: https://www.linkedin.com/in/andrewginter/

Email Andrew: [email protected] 

 

Connect With Aaron Crow:

  • Website: www.corvosec.com 
  • LinkedIn: https://www.linkedin.com/in/aaronccrow
  •  

    Learn more about PrOTect IT All:

    • Website: https://protectitall.co/ 
    • X: https://twitter.com/protectitall 
    • YouTube: https://www.youtube.com/@PrOTectITAll 
    • FaceBook:  https://facebook.com/protectitallpodcast 
    •  

      To be a guest or suggest a guest/episode, please email us at [email protected]



      The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
      ...more
      View all episodesView all episodes
      Download on the App Store

      @BEERISAC: OT/ICS Security Podcast PlaylistBy Anton Shipulin / Listen Notes

      • 4.5
      • 4.5
      • 4.5
      • 4.5
      • 4.5

      4.5

      8 ratings


      More shows like @BEERISAC: OT/ICS Security Podcast Playlist

      View all
      Stuff You Should Know by iHeartPodcasts

      Stuff You Should Know

      78,247 Listeners

      Security Now (Audio) by TWiT

      Security Now (Audio)

      2,002 Listeners

      Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

      Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

      371 Listeners

      Risky Business by Patrick Gray

      Risky Business

      375 Listeners

      SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

      SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

      638 Listeners

      CyberWire Daily by N2K Networks

      CyberWire Daily

      1,020 Listeners

      The Defender's Advantage Podcast by Mandiant

      The Defender's Advantage Podcast

      31 Listeners

      Smashing Security by Graham Cluley

      Smashing Security

      321 Listeners

      The Daily by The New York Times

      The Daily

      112,586 Listeners

      Darknet Diaries by Jack Rhysider

      Darknet Diaries

      8,008 Listeners

      Cybersecurity Today by Jim Love

      Cybersecurity Today

      178 Listeners

      Hacking Humans by N2K Networks

      Hacking Humans

      314 Listeners

      Dr. James Beckett: Sports Card Insights by Dr. James Beckett

      Dr. James Beckett: Sports Card Insights

      113 Listeners

      Cyber Security Headlines by CISO Series

      Cyber Security Headlines

      137 Listeners