OT Data Next

Share

Why Is Your OT Data Still Running Around in Its Birthday Suit?

OT’s security protocol rarely takes IT’s priorities into consideration. This is why a lot of OT communication protocols are not originally designed with encryptions or authentications. But in the era of industrial digital transformation, can OT data still afford to run around naked in an environment teeming with hackers and viruses? In this episode, we invite Jesse Ku, Moxa’s cybersecurity consultant, to share his insights with you.

 

The Content of This Episode

(00:00) Why OT and IT have different views on data security

(07:27) If you want to start OT security, what is the biggest challenge?

(13:06) How to start transforming your OT cybersecurity

(17:50) What is the next frontier for OT cybersecurity?

 

Guest Profile:

Jesse Ku is a cybersecurity consultant at Moxa. He has extensive experience in OT and ICS security, having worked with both public and private sectors, which include critical infrastructure, utilities, and manufacturing. Focusing on IT/OT cybersecurity and cyberthreat trends, Jesse and his team have been helping customers worldwide to develop the best possible solutions to counter the rising tide of cyberattacks and to enhance industrial cybersecurity. As the host of Moxa Security Talks, Jesse often exchanges and shares ideas with other cybersecurity experts in the field.  He is a certified professional in the fields of ethical hacking (CEH), computer forensics (CHFI), security management (SSCP), and OT cybersecurity (IEC/ISA 62443 Cybersecurity Fundamental Specialist).

More Episodes