
Sign up to save your podcasts
Or
Protecting operational technology (OT) environments is more complex than ever, requiring precise inventory, continuous monitoring, and strong IT-OT collaboration.
This week on Feds At the Edge, our expert panel unpacks the key cybersecurity challenges operators face in securing their OT systems.
Anthony J. DiPietro, Technical Director, Defense Critical Infrastructure Division for NSA, underscores the importance of maintaining an accurate inventory, especially in remote environments where “ghost” assets can appear unnoticed.
We’ll discuss how continuous monitoring helps mitigate these risks and why traditional IT security methods, like sandboxes and automatic updates, don’t always work for OT systems.
We also explore the evolving role of AI and Machine learning in OT security, workforce development, and the ever-growing threats posed by interconnected IoT and OT networks.
Tune in on your favorite podcast platform for expert insights on fortifying OT environments against emerging cyber threats.
5
55 ratings
Protecting operational technology (OT) environments is more complex than ever, requiring precise inventory, continuous monitoring, and strong IT-OT collaboration.
This week on Feds At the Edge, our expert panel unpacks the key cybersecurity challenges operators face in securing their OT systems.
Anthony J. DiPietro, Technical Director, Defense Critical Infrastructure Division for NSA, underscores the importance of maintaining an accurate inventory, especially in remote environments where “ghost” assets can appear unnoticed.
We’ll discuss how continuous monitoring helps mitigate these risks and why traditional IT security methods, like sandboxes and automatic updates, don’t always work for OT systems.
We also explore the evolving role of AI and Machine learning in OT security, workforce development, and the ever-growing threats posed by interconnected IoT and OT networks.
Tune in on your favorite podcast platform for expert insights on fortifying OT environments against emerging cyber threats.