7 - Qusai AlRabei: OT security is a business strategy - not just SCADA, DCS & PLCs. IEC, WEF, UAE, Middle East, Global Ciso Forum, Cyber AI
Manage episode 473349190 series 3644038
In this episode of 25Minutes, I sit down with Qusai, a recognized OT Security Leader and recipient of multiple 2024 awards in the Middle East, including OT Security Leader of the Year and Excellence in Cyber Risk Management in 2024. With a background in mechatronics, hands-on experience across industries and a track record that spans academia and industry, Qusai brings a unique perspective on the evolving landscape of OT security. We dive into his early days in OT and what it takes to drive impactful security initiatives in critical infrastructure. Together, we explore why OT security requires a holistic approach, how OT protocols have changed over time and whether the Purdue model still holds up in today’s environments. Qusai also shares lessons from the Oil & Gas sector in the Middle East and how we in Europe, the U.S. and the rest of the world can learn from it. Plus, a surprising story from a recent audit involving a legacy system that refuses to be decommissioned. If you're looking to improve your OT security strategy with real-world insights, this episode will provide you with a wealth of perspective and precision - all in just 25 minutes.
Important note: The views and opinions expressed in this episode are solely those of the individuals involved and do not necessarily reflect those of any organization, employer or affiliation.
Our Guest:
LinkedIn: https://ae.linkedin.com/in/qusai-alrabei-cybersecurity
https://www.weforum.org/stories/2023/12/why-securing-the-ot-environment-is-important/
25 Minutes Podcast
Hostey by: Eliel Mulumba
Audio editing & mastering: Michael Lauderez
Join conversation on LinkedIn: www.linkedin.com/in/eliel-mulumba-133919147
Chapters
1. Introduction and guest background (00:00:00)
2. Journey into OT security (00:01:54)
3. Achievements and awards (00:05:42)
4. Mentorship and knowledge sharing (00:08:01)
5. OT security purdue model (00:12:23)
6. Challenges with legacy systems (00:16:01)
7. Conclusion and future insights (00:20:04)
11 episodes