SlideShare a Scribd company logo
1 of 29
Download to read offline
Internet of Things
Adapting
Experts share how to embrace
the coming merger of IT and OT.
for the
Change the Dynamics
How Does the IoT
Between IT and OT?
“The coming phenomenon
referred to as the ‘ IoT’ is in large
part about the ultimate physical
merging of many traditional OT
and IT components.”
Chris Blask
@chrisblask
Chair of ICS-ISAC
“The ‘OT is different than IT’
fallacy stems from ICS
professionals comparing OT
to desktop management.
OT is mission critical IT.”
Dale Peterson
@digitalbond
Founder of Digital Bond & S4 Conference
Leading SCADA security blogger
“Although this [merger] has many
benefits for interoperability and
efficiency, it also brings security
risks.”
“Cooperation on a consistent
security strategy across both IT
and OT is essential for the future.”
David Meltzer
@davidjmeltzer
Chief Research Officer, Tripwire
“The choice to connect plant floor devices
and share information for many
manufacturers in the past depended on a
controls engineer taking initiative. That
engineer may or may not know how to connect
in a way that made information available and
made the network secure.”
“Those days are over. The risk is too high.”
Doug Brock
@doug_brock
Factory Automation Expert
“Until recently, there were only two
classes of smart devices in the typical
industrial facility; the devices ‘owned’ by IT,
and the controllers ‘owned’ by OT.”
“All of these assets have unique operational
and access requirements—all are at different
levels of security, and all now need to be
considered in any holistic security strategy.”
Eric Byres
@tofinosecurity
ICS and SCADA security expert
“IT desires data directly from
production/manufacturing and OT
usually implements IoT in production/
manufacturing.”
“This is a way that both organizations
can collaborate without politics
interfering.”
Gary Mintchell
@garymintchell
Founder/CEO, The Manufacturing Connection
“It is abundantly clear the fractured IT/OT
relationship will need to become stronger
and more connected.”
“OT focuses on keeping plants up and running
and plugging any weakness around the ICS.
Along those same lines, IT faces a fire hose of
new attacks with all types new of devices
connecting in to the enterprise.”
Greg Hale
@isssource
Editor/Founder of ISSSource.com
“The real issue is the blurring of the
line as IT implements ‘things that smell
like OT,’ and OT implements ‘things that
are traditional IT.’”
“When the line is blurred, where does the
responsibility for resilience lie?”
James Arlen
@myrcurial
Director, Risk Advisory Services
Leviathan Security Group
“As networking extends deeper into devices
and systems, businesses will be able to
collect finer-grained and timelier information
and use this information to optimize
processes, minimize downtime, and reduce
operating costs.”
“Achieving this vision, however, requires
closer cooperation between the OT and IT
worlds than has historically been required.”
Jeff Lund
jeff.lund@belden.com
IIoT Expert, Product Management, Belden
Pat Differ
pat.differ@securicon.com
Cybersecurity Expert for Real-time Systems
Securicon, Inc.
“Today, IT professionals and engineering
professionals have different capabilities,
roles and responsibilities, although there
is some convergence centered around
security.”
“The dynamics are starting to become
more tightly integrated.”
“IT and OT are different, but this is
really just a matter of time.
At some point in the not too distant
future, we will only have technology.
No more IT/OT distinction. Just T.”
Patrick Miller
@PatrickCMiller
Critical Infrastructure Security and Regulatory Advisor
“IoT is not changing the dynamics
between IT and OT. The systems
themselves have been converging
for years in terms of technology.
The difference between IT and OT
is in what they do.”
Robert Lee
@RobertMLee
USAF Cyber Warfare Ops Officer
“The overall implications are relating
to what is owned, what is not, and
where the border ends, not only at
the corporate perimeter but also at
the device level.”
John Walker
@SBLTD
Freelance Author in Cyber Security
IT and OT
What practical tips can you provide for
to work together effectively?
Chris Blask
@chrisblask
Chair of ICS-ISAC
“IT and OT have two different skill sets that
can effectively complement each other.
Both sides need to remember that it is a
two-way street and if they work together
they can support each other.”
Teamwork
Cross-Functional
Training
“For IT security pros that want to
cooperate on security with OT, learning
about how OT works is a great starting
place.”
David Meltzer
@davidjmeltzer
Chief Research Officer, Tripwire
“If you don’t know security, you risk bringing
down or exposing your network. The bigger risk
might be not allowing your workers access to
information, while your competitors do. Get
educated or get help but don’t wing it.”
Improve Skills
& Capabilities Doug Brock
@doug_brock
Factory Automation Expert
“One vulnerable system is a potential pathway to
all systems. Yet at the same time, IT can’t own all
systems. Senior management can be the first to
identify the IoT systems, be clear on who is
responsible for each one and then drive
consistent behaviors for security through out
the company.”
Goal Setting
Eric Byres
@tofinosecurity
ICS and SCADA security expert
“Getting IT and OT to work together is not a
technology problem. It is a people problem.
Organizationally, the best way is cross-functional
training and teamwork guided by a leader who
creates a collaborative environment and metrics
that emphasize teamwork.”
Cross-Functional
Training Gary Mintchell
@garymintchell
Founder/CEO, The Manufacturing Connection
“Communicate.
If IT and OT get that down, then everything
else falls into place. Yes, their missions
differ. Working together is so vital, the
mandate has to come from the top.”
Communication Greg Hale
@isssource
Editor/Founder of ISSSource.com
“The most practical tip is to execute on having
some people skills, cooperating to ensure that
there is a bright-line for responsibility, and that
where knowledge transfer can be undertaken, it
is obvious that the transfer happens.”
People Skills James Arlen
@myrcurial
Director, Risk Advisory Services
Leviathan Security Group
“IT must work closely with OT to understand
the volume of data, as well as archiving and
retention needs. Once we have secure
connections to remote devices, data and
scalable storage, IT and OT will need to
collaborate to make use of that data.”
Collaboration Jeff Lund
jeff.lund@belden.com
IIoT Expert, Product Management, Belden
“Set up a core IoT ownership group that includes
both IT and OT to establish roles, responsibilities,
common goals, and objectives.”
“Establish role-based training and awareness
programs for IoT that outlines the corporate
objectives, eliminates any potential silos and insures
daily cooperation with all stakeholders.”
Role-Based
Training Pat Differ
pat.differ@securicon.com
Cybersecurity Expert for Real-time Systems
Securicon, Inc.
“Spend some time working side by side
with the other [group]. Job shadowing
and embedded observation will do
wonders for helping both sides see each
other’s perspective more clearly.”
Observation
Patrick Miller
@PatrickCMiller
Critical Infrastructure Security and Regulatory Advisor
“The most important thing for having IT
and OT work together is to ensure that the
people are integrating together to voice
their concerns and identify what they
consider critical assets and processes.”
Integration Robert Lee
@RobertMLee
USAF Cyber Warfare Ops Officer
http://tripwire.me/adaptitot
Read more at:
Image courtesy of ShutterStock.com
and
www.belden.com/adaptitot	
  
www.tripwire.com/blog
For the latest security news, trends and insights, visit:
@TripwireInc	
  
For industrial security news and discussions, visit:
www.belden.com/blog	
  
@BeldenInc	
  

More Related Content

What's hot

Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big dataPeter Wood
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsFrederic Roy-Gobeil, CPA, CGA, M.Tax.
 
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksLessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksMighty Guides, Inc.
 
OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...
OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...
OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...Mighty Guides, Inc.
 
Should we fear the cloud?
Should we fear the cloud?Should we fear the cloud?
Should we fear the cloud?Gabe Akisanmi
 
8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery8 Experts on Flawless App Delivery
8 Experts on Flawless App DeliveryMighty Guides, Inc.
 
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...Matthew Rosenquist
 
SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013Wolfgang Kandek
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...SolarWinds
 
Helen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry CollaborationHelen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry Collaborationcentralohioissa
 
Is your infrastructure holding you back?
Is your infrastructure holding you back?Is your infrastructure holding you back?
Is your infrastructure holding you back?Gabe Akisanmi
 
Protecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud SecurityProtecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud SecurityInnoTech
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloudcentralohioissa
 
Understanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeSounil Yu
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
Staying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMStaying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMRick Bouter
 

What's hot (20)

Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big data
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
 
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksLessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
 
OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...
OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...
OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...
 
Shadow IT
Shadow ITShadow IT
Shadow IT
 
Should we fear the cloud?
Should we fear the cloud?Should we fear the cloud?
Should we fear the cloud?
 
8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery
 
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
 
SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
 
Helen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry CollaborationHelen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry Collaboration
 
Is your infrastructure holding you back?
Is your infrastructure holding you back?Is your infrastructure holding you back?
Is your infrastructure holding you back?
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019
 
Protecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud SecurityProtecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud Security
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloud
 
Understanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor Landscape
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
Staying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMStaying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBM
 
Cloud security with Sage Construction Anywhere
Cloud security with Sage Construction AnywhereCloud security with Sage Construction Anywhere
Cloud security with Sage Construction Anywhere
 

Viewers also liked

Falling in Love With Forms [Breaking Development Nashville 2015]
Falling in Love With Forms [Breaking Development Nashville 2015]Falling in Love With Forms [Breaking Development Nashville 2015]
Falling in Love With Forms [Breaking Development Nashville 2015]Aaron Gustafson
 
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...APNIC
 
Pacific ICT Days - IPv6: The future of the Internet
Pacific ICT Days - IPv6: The future of the InternetPacific ICT Days - IPv6: The future of the Internet
Pacific ICT Days - IPv6: The future of the InternetAPNIC
 
How the Convergence of IT and OT Enables Smart Grid Development
How the Convergence of IT and OT Enables Smart Grid DevelopmentHow the Convergence of IT and OT Enables Smart Grid Development
How the Convergence of IT and OT Enables Smart Grid DevelopmentSchneider Electric
 
Alstom Grid And Capgemini Form Global Alliance For Smart Grid: About the Firs...
Alstom Grid And Capgemini Form Global Alliance For Smart Grid: About the Firs...Alstom Grid And Capgemini Form Global Alliance For Smart Grid: About the Firs...
Alstom Grid And Capgemini Form Global Alliance For Smart Grid: About the Firs...Capgemini
 
Nvivo10質性研究軟應用-三星統計陳群典顧問-20130727
Nvivo10質性研究軟應用-三星統計陳群典顧問-20130727Nvivo10質性研究軟應用-三星統計陳群典顧問-20130727
Nvivo10質性研究軟應用-三星統計陳群典顧問-20130727Beckett Hsieh
 
[FAQs] Best Practices for IT/OT Convergence
[FAQs] Best Practices for IT/OT Convergence[FAQs] Best Practices for IT/OT Convergence
[FAQs] Best Practices for IT/OT ConvergenceSchneider Electric
 
質性研究軟體Nvivo10實作-三星統計陳群典顧問-20131123版
質性研究軟體Nvivo10實作-三星統計陳群典顧問-20131123版質性研究軟體Nvivo10實作-三星統計陳群典顧問-20131123版
質性研究軟體Nvivo10實作-三星統計陳群典顧問-20131123版Beckett Hsieh
 
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesImproving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesTripwire
 
Free Powerpoint Templates
Free Powerpoint TemplatesFree Powerpoint Templates
Free Powerpoint TemplatesPowerpoint
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security ElementsEurotech
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsShah Sheikh
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT securityJulien Vermillard
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and ChallengesOWASP Delhi
 
How I Created Easy Infographics Using MS PowerPoint
How I Created Easy Infographics Using MS PowerPointHow I Created Easy Infographics Using MS PowerPoint
How I Created Easy Infographics Using MS PowerPointKimberly Gauthier
 
Infographics Shapes TimeLines PPT Flow Diagrams - infodiagram part2
Infographics Shapes TimeLines PPT Flow Diagrams - infodiagram part2Infographics Shapes TimeLines PPT Flow Diagrams - infodiagram part2
Infographics Shapes TimeLines PPT Flow Diagrams - infodiagram part2Peter Zvirinsky
 

Viewers also liked (20)

IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 
Falling in Love With Forms [Breaking Development Nashville 2015]
Falling in Love With Forms [Breaking Development Nashville 2015]Falling in Love With Forms [Breaking Development Nashville 2015]
Falling in Love With Forms [Breaking Development Nashville 2015]
 
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
 
Pacific ICT Days - IPv6: The future of the Internet
Pacific ICT Days - IPv6: The future of the InternetPacific ICT Days - IPv6: The future of the Internet
Pacific ICT Days - IPv6: The future of the Internet
 
How the Convergence of IT and OT Enables Smart Grid Development
How the Convergence of IT and OT Enables Smart Grid DevelopmentHow the Convergence of IT and OT Enables Smart Grid Development
How the Convergence of IT and OT Enables Smart Grid Development
 
Alstom Grid And Capgemini Form Global Alliance For Smart Grid: About the Firs...
Alstom Grid And Capgemini Form Global Alliance For Smart Grid: About the Firs...Alstom Grid And Capgemini Form Global Alliance For Smart Grid: About the Firs...
Alstom Grid And Capgemini Form Global Alliance For Smart Grid: About the Firs...
 
Nvivo10質性研究軟應用-三星統計陳群典顧問-20130727
Nvivo10質性研究軟應用-三星統計陳群典顧問-20130727Nvivo10質性研究軟應用-三星統計陳群典顧問-20130727
Nvivo10質性研究軟應用-三星統計陳群典顧問-20130727
 
[FAQs] Best Practices for IT/OT Convergence
[FAQs] Best Practices for IT/OT Convergence[FAQs] Best Practices for IT/OT Convergence
[FAQs] Best Practices for IT/OT Convergence
 
質性研究軟體Nvivo10實作-三星統計陳群典顧問-20131123版
質性研究軟體Nvivo10實作-三星統計陳群典顧問-20131123版質性研究軟體Nvivo10實作-三星統計陳群典顧問-20131123版
質性研究軟體Nvivo10實作-三星統計陳群典顧問-20131123版
 
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesImproving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & Executives
 
Internet of Things - Advantech IoT Gateway Starter Kit
Internet of Things - Advantech IoT Gateway Starter KitInternet of Things - Advantech IoT Gateway Starter Kit
Internet of Things - Advantech IoT Gateway Starter Kit
 
Free Powerpoint Templates
Free Powerpoint TemplatesFree Powerpoint Templates
Free Powerpoint Templates
 
7 PowerPoint Design Hacks
7 PowerPoint Design Hacks7 PowerPoint Design Hacks
7 PowerPoint Design Hacks
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
The Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security IssuesThe Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security Issues
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS Environments
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT security
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and Challenges
 
How I Created Easy Infographics Using MS PowerPoint
How I Created Easy Infographics Using MS PowerPointHow I Created Easy Infographics Using MS PowerPoint
How I Created Easy Infographics Using MS PowerPoint
 
Infographics Shapes TimeLines PPT Flow Diagrams - infodiagram part2
Infographics Shapes TimeLines PPT Flow Diagrams - infodiagram part2Infographics Shapes TimeLines PPT Flow Diagrams - infodiagram part2
Infographics Shapes TimeLines PPT Flow Diagrams - infodiagram part2
 

Similar to IoT Merger of IT and OT

Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsTripwire
 
Cybersecurity and the Role of Converged Infrastructure June 2016
Cybersecurity and the Role of Converged  Infrastructure June 2016Cybersecurity and the Role of Converged  Infrastructure June 2016
Cybersecurity and the Role of Converged Infrastructure June 2016David Rubal, CISSP
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationTripwire
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
Charleston R!OT IoT Applications for Defense Workshop
Charleston R!OT IoT Applications for Defense WorkshopCharleston R!OT IoT Applications for Defense Workshop
Charleston R!OT IoT Applications for Defense WorkshopJoseph Hirl
 
Strategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity RiskStrategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity RiskMighty Guides, Inc.
 
Internet of Things - Asked and Answered
Internet of Things - Asked and AnsweredInternet of Things - Asked and Answered
Internet of Things - Asked and AnsweredADCBarcode
 
From internet of-things to internet-of-everything
From internet of-things to internet-of-everythingFrom internet of-things to internet-of-everything
From internet of-things to internet-of-everythingElevate Ventures
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportKim Jensen
 
Cyber Security Lessons from the NSA
Cyber Security Lessons from the NSACyber Security Lessons from the NSA
Cyber Security Lessons from the NSACipherCloud
 
How blockchain will defend iot
How blockchain will defend iotHow blockchain will defend iot
How blockchain will defend iotHitesh Malviya
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonPatricia M Watson
 
Cyber Security Mesh
Cyber Security Mesh Cyber Security Mesh
Cyber Security Mesh EvaJohnson26
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscapeSamir SEHIL
 

Similar to IoT Merger of IT and OT (20)

Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The Experts
 
Cybersecurity and the Role of Converged Infrastructure June 2016
Cybersecurity and the Role of Converged  Infrastructure June 2016Cybersecurity and the Role of Converged  Infrastructure June 2016
Cybersecurity and the Role of Converged Infrastructure June 2016
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
Internet
InternetInternet
Internet
 
expert tips
expert tipsexpert tips
expert tips
 
Ten Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things SecurityTen Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things Security
 
Charleston R!OT IoT Applications for Defense Workshop
Charleston R!OT IoT Applications for Defense WorkshopCharleston R!OT IoT Applications for Defense Workshop
Charleston R!OT IoT Applications for Defense Workshop
 
Strategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity RiskStrategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity Risk
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
Internet of Things - Asked and Answered
Internet of Things - Asked and AnsweredInternet of Things - Asked and Answered
Internet of Things - Asked and Answered
 
From internet of-things to internet-of-everything
From internet of-things to internet-of-everythingFrom internet of-things to internet-of-everything
From internet of-things to internet-of-everything
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security Report
 
Cyber Security Lessons from the NSA
Cyber Security Lessons from the NSACyber Security Lessons from the NSA
Cyber Security Lessons from the NSA
 
How blockchain will defend iot
How blockchain will defend iotHow blockchain will defend iot
How blockchain will defend iot
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 Watson
 
Cyber Security Mesh
Cyber Security Mesh Cyber Security Mesh
Cyber Security Mesh
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 

More from Tripwire

Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughMind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughTripwire
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyTripwire
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire
 
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire
 
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire
 
World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationTripwire
 
Tripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire
 
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportKey Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportTripwire
 
The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!Tripwire
 
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...Tripwire
 
Tripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire
 
A Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsA Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsTripwire
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkTripwire
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksTripwire
 
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7Tripwire
 
Hunting for Cyber Threats Using Threat Modeling & Frameworks
Hunting for Cyber Threats Using Threat Modeling & Frameworks Hunting for Cyber Threats Using Threat Modeling & Frameworks
Hunting for Cyber Threats Using Threat Modeling & Frameworks Tripwire
 
Most RSAC Attendees Favor Shorter Vulnerability Disclosure Timelines
Most RSAC Attendees Favor Shorter Vulnerability Disclosure TimelinesMost RSAC Attendees Favor Shorter Vulnerability Disclosure Timelines
Most RSAC Attendees Favor Shorter Vulnerability Disclosure TimelinesTripwire
 
ICS Security in the Energy Industry
ICS Security in the Energy IndustryICS Security in the Energy Industry
ICS Security in the Energy IndustryTripwire
 

More from Tripwire (20)

Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughMind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data Privacy
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale Peterson
 
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
 
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase Cole
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller
 
World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest Celebration
 
Tripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key Findings
 
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportKey Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
 
The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!
 
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
 
Tripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key Findings
 
A Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsA Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber Moments
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK Framework
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber Attacks
 
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
 
Hunting for Cyber Threats Using Threat Modeling & Frameworks
Hunting for Cyber Threats Using Threat Modeling & Frameworks Hunting for Cyber Threats Using Threat Modeling & Frameworks
Hunting for Cyber Threats Using Threat Modeling & Frameworks
 
Most RSAC Attendees Favor Shorter Vulnerability Disclosure Timelines
Most RSAC Attendees Favor Shorter Vulnerability Disclosure TimelinesMost RSAC Attendees Favor Shorter Vulnerability Disclosure Timelines
Most RSAC Attendees Favor Shorter Vulnerability Disclosure Timelines
 
ICS Security in the Energy Industry
ICS Security in the Energy IndustryICS Security in the Energy Industry
ICS Security in the Energy Industry
 

Recently uploaded

Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxBipin Adhikari
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 

Recently uploaded (20)

Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptx
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 

IoT Merger of IT and OT

  • 1. Internet of Things Adapting Experts share how to embrace the coming merger of IT and OT. for the
  • 2. Change the Dynamics How Does the IoT Between IT and OT?
  • 3. “The coming phenomenon referred to as the ‘ IoT’ is in large part about the ultimate physical merging of many traditional OT and IT components.” Chris Blask @chrisblask Chair of ICS-ISAC
  • 4. “The ‘OT is different than IT’ fallacy stems from ICS professionals comparing OT to desktop management. OT is mission critical IT.” Dale Peterson @digitalbond Founder of Digital Bond & S4 Conference Leading SCADA security blogger
  • 5. “Although this [merger] has many benefits for interoperability and efficiency, it also brings security risks.” “Cooperation on a consistent security strategy across both IT and OT is essential for the future.” David Meltzer @davidjmeltzer Chief Research Officer, Tripwire
  • 6. “The choice to connect plant floor devices and share information for many manufacturers in the past depended on a controls engineer taking initiative. That engineer may or may not know how to connect in a way that made information available and made the network secure.” “Those days are over. The risk is too high.” Doug Brock @doug_brock Factory Automation Expert
  • 7. “Until recently, there were only two classes of smart devices in the typical industrial facility; the devices ‘owned’ by IT, and the controllers ‘owned’ by OT.” “All of these assets have unique operational and access requirements—all are at different levels of security, and all now need to be considered in any holistic security strategy.” Eric Byres @tofinosecurity ICS and SCADA security expert
  • 8. “IT desires data directly from production/manufacturing and OT usually implements IoT in production/ manufacturing.” “This is a way that both organizations can collaborate without politics interfering.” Gary Mintchell @garymintchell Founder/CEO, The Manufacturing Connection
  • 9. “It is abundantly clear the fractured IT/OT relationship will need to become stronger and more connected.” “OT focuses on keeping plants up and running and plugging any weakness around the ICS. Along those same lines, IT faces a fire hose of new attacks with all types new of devices connecting in to the enterprise.” Greg Hale @isssource Editor/Founder of ISSSource.com
  • 10. “The real issue is the blurring of the line as IT implements ‘things that smell like OT,’ and OT implements ‘things that are traditional IT.’” “When the line is blurred, where does the responsibility for resilience lie?” James Arlen @myrcurial Director, Risk Advisory Services Leviathan Security Group
  • 11. “As networking extends deeper into devices and systems, businesses will be able to collect finer-grained and timelier information and use this information to optimize processes, minimize downtime, and reduce operating costs.” “Achieving this vision, however, requires closer cooperation between the OT and IT worlds than has historically been required.” Jeff Lund jeff.lund@belden.com IIoT Expert, Product Management, Belden
  • 12. Pat Differ pat.differ@securicon.com Cybersecurity Expert for Real-time Systems Securicon, Inc. “Today, IT professionals and engineering professionals have different capabilities, roles and responsibilities, although there is some convergence centered around security.” “The dynamics are starting to become more tightly integrated.”
  • 13. “IT and OT are different, but this is really just a matter of time. At some point in the not too distant future, we will only have technology. No more IT/OT distinction. Just T.” Patrick Miller @PatrickCMiller Critical Infrastructure Security and Regulatory Advisor
  • 14. “IoT is not changing the dynamics between IT and OT. The systems themselves have been converging for years in terms of technology. The difference between IT and OT is in what they do.” Robert Lee @RobertMLee USAF Cyber Warfare Ops Officer
  • 15. “The overall implications are relating to what is owned, what is not, and where the border ends, not only at the corporate perimeter but also at the device level.” John Walker @SBLTD Freelance Author in Cyber Security
  • 16. IT and OT What practical tips can you provide for to work together effectively?
  • 17. Chris Blask @chrisblask Chair of ICS-ISAC “IT and OT have two different skill sets that can effectively complement each other. Both sides need to remember that it is a two-way street and if they work together they can support each other.” Teamwork
  • 18. Cross-Functional Training “For IT security pros that want to cooperate on security with OT, learning about how OT works is a great starting place.” David Meltzer @davidjmeltzer Chief Research Officer, Tripwire
  • 19. “If you don’t know security, you risk bringing down or exposing your network. The bigger risk might be not allowing your workers access to information, while your competitors do. Get educated or get help but don’t wing it.” Improve Skills & Capabilities Doug Brock @doug_brock Factory Automation Expert
  • 20. “One vulnerable system is a potential pathway to all systems. Yet at the same time, IT can’t own all systems. Senior management can be the first to identify the IoT systems, be clear on who is responsible for each one and then drive consistent behaviors for security through out the company.” Goal Setting Eric Byres @tofinosecurity ICS and SCADA security expert
  • 21. “Getting IT and OT to work together is not a technology problem. It is a people problem. Organizationally, the best way is cross-functional training and teamwork guided by a leader who creates a collaborative environment and metrics that emphasize teamwork.” Cross-Functional Training Gary Mintchell @garymintchell Founder/CEO, The Manufacturing Connection
  • 22. “Communicate. If IT and OT get that down, then everything else falls into place. Yes, their missions differ. Working together is so vital, the mandate has to come from the top.” Communication Greg Hale @isssource Editor/Founder of ISSSource.com
  • 23. “The most practical tip is to execute on having some people skills, cooperating to ensure that there is a bright-line for responsibility, and that where knowledge transfer can be undertaken, it is obvious that the transfer happens.” People Skills James Arlen @myrcurial Director, Risk Advisory Services Leviathan Security Group
  • 24. “IT must work closely with OT to understand the volume of data, as well as archiving and retention needs. Once we have secure connections to remote devices, data and scalable storage, IT and OT will need to collaborate to make use of that data.” Collaboration Jeff Lund jeff.lund@belden.com IIoT Expert, Product Management, Belden
  • 25. “Set up a core IoT ownership group that includes both IT and OT to establish roles, responsibilities, common goals, and objectives.” “Establish role-based training and awareness programs for IoT that outlines the corporate objectives, eliminates any potential silos and insures daily cooperation with all stakeholders.” Role-Based Training Pat Differ pat.differ@securicon.com Cybersecurity Expert for Real-time Systems Securicon, Inc.
  • 26. “Spend some time working side by side with the other [group]. Job shadowing and embedded observation will do wonders for helping both sides see each other’s perspective more clearly.” Observation Patrick Miller @PatrickCMiller Critical Infrastructure Security and Regulatory Advisor
  • 27. “The most important thing for having IT and OT work together is to ensure that the people are integrating together to voice their concerns and identify what they consider critical assets and processes.” Integration Robert Lee @RobertMLee USAF Cyber Warfare Ops Officer
  • 28. http://tripwire.me/adaptitot Read more at: Image courtesy of ShutterStock.com and www.belden.com/adaptitot  
  • 29. www.tripwire.com/blog For the latest security news, trends and insights, visit: @TripwireInc   For industrial security news and discussions, visit: www.belden.com/blog   @BeldenInc