OT Data Next


Is Your OT Data Going Through the Terrible Twos?

Before explaining to you why connecting operational data (OT data) is not as easy as you would think, it is wise to first learn more about the changes that OT data is undergoing. In fact, your OT data is going through the terrible twos, making it difficult to deal with the data itself, and, furthermore, making it easy to derail you at the first step of your industrial digital transformation journey. In this episode, we have invited Patrick Bor, who has more than ten years of experience in industrial automation, to share with us how to deal with these changes and challenges.


The Content of This Episode:

(00:00) Stuck on the first step of industrial digital transformation

(02:36) OT data is going through the terrible twos

(06:29) Four challenges when coping with OT data

(16:45) What is the next step for OT data?


Guest Profile:

Patrick Bor has more than ten years of software development experience in the IT field, during which he has also won the Taiwan Excellent Information Application Award. After entering the OT field, he was responsible for the product development of remote I/O and industrial computers and designed OT data collection, edge computing, and other technologies for different vertical markets.

More Episodes


Why Is Your OT Data Still Running Around in Its Birthday Suit?

OT’s security protocol rarely takes IT’s priorities into consideration. This is why a lot of OT communication protocols are not originally designed with encryptions or authentications. But in the era of industrial digital transformation, can OT data still afford to run around naked in an environment teeming with hackers and viruses? In this episode, we invite Jesse Ku, Moxa’s cybersecurity consultant, to share his insights with you.The Content of This Episode(00:00) Why OT and IT have different views on data security(07:27) If you want to start OT security, what is the biggest challenge?(13:06) How to start transforming your OT cybersecurity(17:50) What is the next frontier for OT cybersecurity?Guest Profile:Jesse Ku is a cybersecurity consultant at Moxa. He has extensive experience in OT and ICS security, having worked with both public and private sectors, which include critical infrastructure, utilities, and manufacturing. Focusing on IT/OT cybersecurity and cyberthreat trends, Jesse and his team have been helping customers worldwide to develop the best possible solutions to counter the rising tide of cyberattacks and to enhance industrial cybersecurity. As the host of Moxa Security Talks, Jesse often exchanges and shares ideas with other cybersecurity experts in the field.He is a certified professional in the fields of ethical hacking (CEH), computer forensics (CHFI), security management (SSCP), and OT cybersecurity (IEC/ISA 62443 Cybersecurity Fundamental Specialist).