
Sign up to save your podcasts
Or
Series 2 – Episode 4!
Cyber Brews: Trust No One, Verify Everything (Zero Trust)
This month’s brew dives into a game-changing security model that’s making waves in both IT and OT: Zero Trust. Forget the old perimeter mindset — in this episode, we explore why trust is no longer a security strategy, especially when it comes to protecting critical industrial systems.
We kick off with a breakdown of what Zero Trust actually means, where it came from, and why it’s become essential in the world of Operational Technology. As OT and IT networks continue to converge, the traditional “trust but verify” approach just doesn’t cut it anymore.
Key topics on the table include:
Why OT environments need Zero Trust now more than ever.
How to apply Role-Based Access Control, Network Segmentation, MFA, and Continuous Monitoring in industrial settings.
The real-world benefits of Zero Trust: from reduced insider threats to better compliance and resilience.
Common challenges and how to start making progress, even in complex legacy environments.
So grab your favourite brew and join us as we unravel how Zero Trust could secure the future of OT — one segment, one policy, one verified connection at a time.
Series 2 – Episode 4!
Cyber Brews: Trust No One, Verify Everything (Zero Trust)
This month’s brew dives into a game-changing security model that’s making waves in both IT and OT: Zero Trust. Forget the old perimeter mindset — in this episode, we explore why trust is no longer a security strategy, especially when it comes to protecting critical industrial systems.
We kick off with a breakdown of what Zero Trust actually means, where it came from, and why it’s become essential in the world of Operational Technology. As OT and IT networks continue to converge, the traditional “trust but verify” approach just doesn’t cut it anymore.
Key topics on the table include:
Why OT environments need Zero Trust now more than ever.
How to apply Role-Based Access Control, Network Segmentation, MFA, and Continuous Monitoring in industrial settings.
The real-world benefits of Zero Trust: from reduced insider threats to better compliance and resilience.
Common challenges and how to start making progress, even in complex legacy environments.
So grab your favourite brew and join us as we unravel how Zero Trust could secure the future of OT — one segment, one policy, one verified connection at a time.