DiscoverPrOTect It AllFunding OT Cybersecurity: Priority Setting and Practical Approaches
Funding OT Cybersecurity: Priority Setting and Practical Approaches

Funding OT Cybersecurity: Priority Setting and Practical Approaches

Update: 2024-09-23
Share

Description

Welcome to Episode 25 of the Protect It All podcast, titled "Funding OT Cybersecurity: Priority Setting and Practical Approaches." In this episode, host Aaron Crow tackles the pressing issue of securing Operational Technology (OT) systems in critical sectors like energy, manufacturing, and transportation. Although often overshadowed by IT security, the increasing number of OT system attacks makes it clear that underfunding is no longer an option.


Aaron explores the unique challenges of OT cybersecurity, such as legacy thinking and budget constraints. He offers strategies to align cybersecurity with business goals, prioritize investments effectively, and implement risk-based funding approaches. The episode emphasizes the importance of understanding asset inventories and making incremental improvements to strengthen security.


Listeners will also learn how to bridge the communication gap between OT teams and business executives and translate technical risks into business impacts. With real-world examples and actionable insights, this episode is essential for anyone tasked with protecting OT environments.


Tune in to gain valuable knowledge and start effectively prioritizing and funding your OT cybersecurity initiatives.






Key Moments : 


 


00:10 Cybersecurity requires comprehensive, risk-aware approach beyond basic safety.


05:18 Understanding OT risks is crucial for prioritization.


09:11 We do business at the speed of trust.


12:13 Communicate cybersecurity's financial impact to business leaders.


13:58 Cost-benefit analysis of asset inventory in OT.


18:15 Establish security basics before advanced AI implementation.


23:21 Easier board conversations amid constant news events.





Connect With Aaron Crow:



 


Learn more about PrOTect IT All:



 


To be a guest or suggest a guest/episode, please email us at info@protectitall.co


 

Comments 
In Channel
loading
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Funding OT Cybersecurity: Priority Setting and Practical Approaches

Funding OT Cybersecurity: Priority Setting and Practical Approaches

Aaron Crow