Weak Protection of OT from IT – Lack Of Network Segregation

Audio Transcript

similarly segmentation the entry path to ot or iot uh attacks are usually id and how do we segregate the it network from the ot or the IoT network that is also an important piece and we’ll have to establish uh an authenticated network path and there has to be a machine which monitors and this machine should be owned by the security organization in managing the connectivity between ide and the ot or the IoT environment this is where webring in our network segmentation solution which and which can also bring in micro-segmentation and allow uh building secure uh zones and conduits between those zones to make sure that there is no lateral movement of the attack and also this uh solutions can help in building baselines to smart spot any anomalies or configuration changes or tag changes within the network environment itself

Leave a Reply

Your email address will not be published. Required fields are marked *

Scroll to Top