The State of OT Security

The State of OT Security

Update: 2024-10-03
Share

Description

In this episode of Threat Vector, David Moulton, Director of Thought Leadership at Palo Alto Networks, hosts cybersecurity experts Qiang Huang, VP of Product Management for Cloud Delivered Security Services, and Michela Menting, Senior Research Director in Digital Security at ABI Research. They discuss the pressing challenges of securing Operational Technology (OT) environments, which are increasingly vulnerable to ransomware, nation-state attacks, and remote access breaches due to the digital transformation in industries like manufacturing and energy. Learn how IT and OT convergence is reshaping cybersecurity strategies and what actions organizations must take to safeguard critical infrastructure. Tune in for expert insights on the complexities of securing OT networks, proactive security measures, and the impacts of cyberattacks on industrial operations.


For more information, please check out this report:


Join the conversation on our social media channels:


About Threat Vector

Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.


The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.


Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.


Palo Alto Networks

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠

Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

The State of OT Security

The State of OT Security

Palo Alto Networks and N2K Networks