Go offline with the Player FM app!
Avoiding the Ostrich Approach
Manage episode 489900146 series 3352216
I’m always tempted to start out each episode by talking about a problem, and then setting up our guest as the solution to that problem. It’s formulaic and a bit redundant, but it’s also effective. So I’ll apologize in advance because I’m about to do that very thing again.
The difference is that Howard Grimes, the CEO of the Cybersecurity Manufacturing Innovation Institute (CyManII) is looking to help provide a lot of solutions for manufacturers. As we discuss workforce challenges, secure-by-design, an evolving threat landscape and the ongoing struggles with legacy OT infrastructure, I’ll challenge you to find something that the Institute couldn’t help you and your organization jumpstart, solve or streamline.
Watch/listen as we discuss:
- The most significant vulnerabilities still impacting manufacturing.
- Why the industrial sector struggles to find OT cybersecurity specialists, and strategies that are helping to fill this gap.
- The growing prominence of secure-by-design and how the responsibilities for these strategies are shifting.
- The areas where legacy OT technology are hampering cybersecurity efforts the most.
- Why the "Ostrich Approach" can no longer be tolerated.
- The new focal points of attackers and how these are shifting based on hacker resources.
As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.
Discover how technology is reshaping our lives and livelihoods.
Listen on: Apple Podcasts Spotify Inspiring Tech Leaders - The Technology Podcast
Interviews with Tech Leaders and insights on the latest emerging technology trends.
Listen on: Apple Podcasts Spotify
To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected].
Chapters
1. Avoiding the Ostrich Approach (00:00:00)
2. [Ad] Digital Disruption with Geoff Nielson (00:26:30)
3. (Cont.) Avoiding the Ostrich Approach (00:27:10)
4. [Ad] Inspiring Tech Leaders - The Technology Podcast (00:34:38)
5. (Cont.) Avoiding the Ostrich Approach (00:35:13)
135 episodes
Manage episode 489900146 series 3352216
I’m always tempted to start out each episode by talking about a problem, and then setting up our guest as the solution to that problem. It’s formulaic and a bit redundant, but it’s also effective. So I’ll apologize in advance because I’m about to do that very thing again.
The difference is that Howard Grimes, the CEO of the Cybersecurity Manufacturing Innovation Institute (CyManII) is looking to help provide a lot of solutions for manufacturers. As we discuss workforce challenges, secure-by-design, an evolving threat landscape and the ongoing struggles with legacy OT infrastructure, I’ll challenge you to find something that the Institute couldn’t help you and your organization jumpstart, solve or streamline.
Watch/listen as we discuss:
- The most significant vulnerabilities still impacting manufacturing.
- Why the industrial sector struggles to find OT cybersecurity specialists, and strategies that are helping to fill this gap.
- The growing prominence of secure-by-design and how the responsibilities for these strategies are shifting.
- The areas where legacy OT technology are hampering cybersecurity efforts the most.
- Why the "Ostrich Approach" can no longer be tolerated.
- The new focal points of attackers and how these are shifting based on hacker resources.
As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.
Discover how technology is reshaping our lives and livelihoods.
Listen on: Apple Podcasts Spotify Inspiring Tech Leaders - The Technology Podcast
Interviews with Tech Leaders and insights on the latest emerging technology trends.
Listen on: Apple Podcasts Spotify
To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected].
Chapters
1. Avoiding the Ostrich Approach (00:00:00)
2. [Ad] Digital Disruption with Geoff Nielson (00:26:30)
3. (Cont.) Avoiding the Ostrich Approach (00:27:10)
4. [Ad] Inspiring Tech Leaders - The Technology Podcast (00:34:38)
5. (Cont.) Avoiding the Ostrich Approach (00:35:13)
135 episodes
All episodes
×Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.