У нас вы можете посмотреть бесплатно Your OT Cybersecurity Strategy Is Failing: Here's Why или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Dino and Craig reunite to tackle the evolving landscape of industrial cybersecurity in 2026. They discuss how OT-focused IDS software companies are shifting away from managed services to partner with systems integrators who understand the plant floor. The conversation explores the challenges manufacturers face—from aging infrastructure spanning decades to flat layer-2 networks that give remote vendors unrestricted access. They emphasize that IT departments cannot effectively manage OT assets they don't own or understand, especially when dealing with equipment older than their cybersecurity staff. The episode covers the pitfalls of penetration testing in live manufacturing environments, the reality of shadow IT versus shadow OT, and why EDR solutions struggle in control system environments. Dino and Craig stress the importance of treating cybersecurity as a marathon rather than a sprint, starting with basic asset inventory and microsegmentation. They call on manufacturing leaders to stop deferring to IT for OT security, attend industry-specific conferences like S4, and partner with systems integrators who have deep automation expertise. With budget cycles opening and threats mounting, the time for action is now—not next quarter. Chapters: (00:00:00) - Welcome & What We've Been Up To (00:00:48) - The Big Shift: Why OT IDS Companies Are Backing Away From Managed Services (00:03:00) - The Shelfware Problem: When Security Tools Sit Unused (00:04:12) - Why Pen Testing Can Be Disruptive (or Dangerous) in Manufacturing Environments (00:05:54) - The Reality of Legacy Infrastructure: Equipment Older Than Your Cybersecurity Team (00:07:43) - Who Can Actually Patch Your Control Systems? (00:09:04) - Supply Chain Vulnerabilities: You're Only as Strong as Your Weakest Link (00:11:01) - The Last Mile Challenge: Asset Inventory, Microsegmentation & Starting Small (00:13:55) - The Shelfware to Tool-Switching Problem: Why Companies Are Reconsidering Their First Choice (00:16:18) - Shadow IT vs. Shadow OT: Who Really Owns Plant Floor Security? (00:19:00) - Why EDR Struggles in Control System Environments (00:21:35) - Time to Step Up: Why Manufacturing Leaders Can't Defer to IT Anymore (00:23:00) - Where to Learn: S4, Automation Fair, and Why You Need to Attend Industry Conferences (00:25:00) - Finding the Right Partner: Systems Integrators Who Speak Automation and Cybersecurity (00:27:00) - Final Thoughts: The Time for Action Is Now Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us in the comment section! #IndustrialCybersecurity #OTSecurity #ManufacturingSecurity #CriticalInfrastructure #ICS #SCADA #PlantFloor #CyberResilience #SystemsIntegrator #IIoT