Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
News
Sports
TV & Film
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts115/v4/e3/d3/11/e3d3118f-622d-1821-f714-ed17f7542b54/mza_12829167936600200329.jpeg/600x600bb.jpg
OT Data Next
Moxa Inc.
7 episodes
7 months ago
For a very long time, OT data has been contained in isolated industrial environments, shrouding it in mystery. As OT data is the starting point for industrial digital transformation, a better understanding of OT data is a priority in both OT and IT world right now. In OT Data Next, experts in the field will unveil the mysteries of OT data to you and help set you on the right path in your digital transformation journey.

Hosted on Acast. See acast.com/privacy for more information.

Show more...
Technology
Business,
Management
RSS
All content for OT Data Next is the property of Moxa Inc. and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
For a very long time, OT data has been contained in isolated industrial environments, shrouding it in mystery. As OT data is the starting point for industrial digital transformation, a better understanding of OT data is a priority in both OT and IT world right now. In OT Data Next, experts in the field will unveil the mysteries of OT data to you and help set you on the right path in your digital transformation journey.

Hosted on Acast. See acast.com/privacy for more information.

Show more...
Technology
Business,
Management
https://assets.pippa.io/shows/60fa63587dd5480012f98daf/1638515863294-77e8c88313d7a61ce5df03e039a8b6a3.jpeg
Why Is Your OT Data Still Running Around in Its Birthday Suit?
OT Data Next
22 minutes 15 seconds
4 years ago
Why Is Your OT Data Still Running Around in Its Birthday Suit?

OT’s security protocol rarely takes IT’s priorities into consideration. This is why a lot of OT communication protocols are not originally designed with encryptions or authentications. But in the era of industrial digital transformation, can OT data still afford to run around naked in an environment teeming with hackers and viruses? In this episode, we invite Jesse Ku, Moxa’s cybersecurity consultant, to share his insights with you.

 

The Content of This Episode

(00:00) Why OT and IT have different views on data security

(07:27) If you want to start OT security, what is the biggest challenge?

(13:06) How to start transforming your OT cybersecurity

(17:50) What is the next frontier for OT cybersecurity?

 

Guest Profile:

Jesse Ku is a cybersecurity consultant at Moxa. He has extensive experience in OT and ICS security, having worked with both public and private sectors, which include critical infrastructure, utilities, and manufacturing. Focusing on IT/OT cybersecurity and cyberthreat trends, Jesse and his team have been helping customers worldwide to develop the best possible solutions to counter the rising tide of cyberattacks and to enhance industrial cybersecurity. As the host of Moxa Security Talks, Jesse often exchanges and shares ideas with other cybersecurity experts in the field.  He is a certified professional in the fields of ethical hacking (CEH), computer forensics (CHFI), security management (SSCP), and OT cybersecurity (IEC/ISA 62443 Cybersecurity Fundamental Specialist).



Hosted on Acast. See acast.com/privacy for more information.

OT Data Next
For a very long time, OT data has been contained in isolated industrial environments, shrouding it in mystery. As OT data is the starting point for industrial digital transformation, a better understanding of OT data is a priority in both OT and IT world right now. In OT Data Next, experts in the field will unveil the mysteries of OT data to you and help set you on the right path in your digital transformation journey.

Hosted on Acast. See acast.com/privacy for more information.