@BEERISAC: OT/ICS Security Podcast Playlist

Bridging the Security Gap: How HERA Transforms Remote Access in Industrial Environments with Andrew Ginter


Listen Later

Podcast: PrOTect It All (LS 25 · TOP 10% what is this?)
Episode: Bridging the Security Gap: How HERA Transforms Remote Access in Industrial Environments with Andrew Ginter
Pub date: 2024-07-22

Get Podcast Transcript →
powered by Listen411 - fast audio-to-text and summarization



Welcome back to *Protect It All*! In Episode 17, host Aaron Crow is joined by Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, to dive deep into secure remote access for Operational Technology (OT) systems. They explore the cutting-edge HERA (Hardware Enforced Remote Access) technology, which offers a revolutionary approach to remote control via TPM hardware, unidirectional gateways, and stringent encryption protocols. 

This episode covers everything from the critical need for robust security in high-stakes environments like wind farms and manufacturing to the dangers of supply chain vulnerabilities to the broader implications for industries dependent on remote operations.

Ginter sheds light on the limitations of software-based solutions and the strategic advantages of hardware-enforced security, while also discussing his book "Engineering Great OT Security" and the latest initiatives in cyber-informed engineering. 

Tune in to learn how organizations can remain competitive, reduce costs, and stay secure in an increasingly interconnected industrial world. This enlightening discussion could change the way you think about remote access!

 

Key Moments: 

 

05:53 Spectrum of consequence in remote access explained.

07:55 Security flaws in remote access systems.

10:23 Remote access is often overlooked by many.

15:11 Supply chain vulnerability due to cloud connectivity.

17:33 Hardware-enforced remote access, HERA, fills the security spectrum.

20:52 Custom ASIC with 1M transistors for encryption.

25:55 Ways to exploit network security vulnerabilities discussed.

26:35 Exploiting technology to send unauthorized messages.

32:50 Benefits of centralizing engineering teams in businesses.

34:18 Competing in the international market with unique services.

39:31 Understanding the implications before implementing technology is crucial.

40:30 Uncertainty about large number, risk opportunity tap.

43:50 Firewall controls data flow and is potentially misconfigurable.

 

About the guest : 

 

At Waterfall Security, Andrew leads a team of experts working with the world's most secure industrial sites. He is the author of three books on industrial security, co-author of the IIoT SF and the UITP Guide to CyberSecurity in Tendering, and co-host of the Industrial Security Podcast.

Links:

https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/hardware-enforced-remote-access-hera-under-the-hood/

LinkedIn: https://www.linkedin.com/in/andrewginter/

Email Andrew: [email protected] 

 

Connect With Aaron Crow:

  • Website: www.corvosec.com 
  • LinkedIn: https://www.linkedin.com/in/aaronccrow
  •  

    Learn more about PrOTect IT All:

    • Website: https://protectitall.co/ 
    • X: https://twitter.com/protectitall 
    • YouTube: https://www.youtube.com/@PrOTectITAll 
    • FaceBook:  https://facebook.com/protectitallpodcast 
    •  

      To be a guest or suggest a guest/episode, please email us at [email protected]



      The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
      ...more
      View all episodesView all episodes
      Download on the App Store

      @BEERISAC: OT/ICS Security Podcast PlaylistBy Anton Shipulin / Listen Notes

      • 4.4
      • 4.4
      • 4.4
      • 4.4
      • 4.4

      4.4

      7 ratings


      More shows like @BEERISAC: OT/ICS Security Podcast Playlist

      View all
      Security Now (Audio) by TWiT

      Security Now (Audio)

      1,986 Listeners

      SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

      SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

      639 Listeners

      The Ben Shapiro Show by The Daily Wire

      The Ben Shapiro Show

      153,400 Listeners

      CyberWire Daily by N2K Networks

      CyberWire Daily

      1,016 Listeners

      Darknet Diaries by Jack Rhysider

      Darknet Diaries

      7,956 Listeners

      Cybersecurity Today by Jim Love

      Cybersecurity Today

      164 Listeners

      The Industrial Security Podcast by PI Media

      The Industrial Security Podcast

      21 Listeners

      Cyber Security Headlines by CISO Series

      Cyber Security Headlines

      128 Listeners

      Hack the Plant by Bryson Bort

      Hack the Plant

      25 Listeners

      Nexus: A Claroty Podcast by Claroty

      Nexus: A Claroty Podcast

      17 Listeners

      Error Code by Robert Vamosi

      Error Code

      9 Listeners

      HOU.SEC.CAST. by Michael Farnum and Sam Van Ryder

      HOU.SEC.CAST.

      7 Listeners