
Sign up to save your podcasts
Or
These days, most companies understand they need IT security and have invested heavily in protecting themselves.
But what about those 20-year-old computers running their production lines?
Yeah, they aren’t secure at all — and hackers know it.
Today’s guest is Tom Jackson, Senior Manager at EY’s Cyber Security Consulting Practice, about the risks, like ransomware, that operational technology presents and what businesses can do to mitigate them.
In this episode, we discuss:
- How OT environments differ from IT
- Why you’ll find 20-year-old computers running in OT environments
- How get assess your risk and get buy-in for security improvements
We’re stronger together. Keep connected with Cybersecurity Heroes at Apple Podcasts, Spotify, Stitcher and Google Podcast.
Listening on a desktop & can’t see the links? Just search for Cybersecurity Heroes in your favorite podcast player.
These days, most companies understand they need IT security and have invested heavily in protecting themselves.
But what about those 20-year-old computers running their production lines?
Yeah, they aren’t secure at all — and hackers know it.
Today’s guest is Tom Jackson, Senior Manager at EY’s Cyber Security Consulting Practice, about the risks, like ransomware, that operational technology presents and what businesses can do to mitigate them.
In this episode, we discuss:
- How OT environments differ from IT
- Why you’ll find 20-year-old computers running in OT environments
- How get assess your risk and get buy-in for security improvements
We’re stronger together. Keep connected with Cybersecurity Heroes at Apple Podcasts, Spotify, Stitcher and Google Podcast.
Listening on a desktop & can’t see the links? Just search for Cybersecurity Heroes in your favorite podcast player.