Protecting Operational Technology with zero-trust

Many instances of operational technology come with insufficient security and few update mechanisms. We talk to Delinea about IIoT security.

11 September 2023 . 00:18:54

Show Notes for Series 03 Episode 49
This podcast is produced in conjunction with Delinea.

Among the most alarming attack vectors that cybercriminals can target are the hardware and software used in industrial settings to monitor and control billions of devices, processes and critical infrastructure. These include control sensors, power generation management, oil & gas refining management, cameras, switches, machinery, and fire systems to cite a few examples. These operational technology (OT) instances are mainly designed to interact with specific equipment, and they don’t always come with sufficient security or update mechanisms built-in to withstand concerted attacks.

Our guest on this episode of the Tech Means Business podcast, Nigel Tan, works for Delinea, a leading Privileged Access Management (PAM) solutions provider that can protect this layer of infrastructure, whether new or legacy.

While endpoint protection is often not viable and network-layer security unsuitable, it’s zero-trust and careful PAM that can make the difference between safe OT and an open door for hackers.

Nigel is Delinea’s Technical Director of Sales Engineering at Delinea for the Asia-Pacific, a battle-hardened professional who’s been active in cybersecurity for many years. Together, we discuss the present situation, the potential for damage to critical national infrastructure and worse, the possibility that a cyber incursion can easily damage human lives, physically.

There are ways and means, of course, to ameliorate the situation, which Nigel helps us discover as we check out Delinea’s OT protection methods.

Check out the Delinea website here:

Read the company’s blog on security, starting here:

Nigel Tan of Delinea is here:

Joe Green’s LinkedIn profile lives here: