Industrial control systems (ICS) have become increasingly network connected over the years, driven by the need for rapid information on production and shipping. This cuts costs for equipment and manpower, but there are risks attached to these business advantages. Additionally, some ICS systems are connected to enterprise IT systems, making it possible for malware to jump from the IT network to the ICS.
In this episode of the InSecurity Podcast, host Shaun Walsh is joined by special guest Chris Blask (@chrisblask) as they discuss industrial control systems and how securing them is different from securing traditional IT systems.
About Chris Blask
Chris Blask is the Chair of the IACI and Global Director of ICS at Unisys. Chris’s career spans the breadth of the cybersecurity spectrum. He invented one of the first commercial firewall products, built a multi-billion dollar firewall business at Cisco System, co-founded an early SIEM vendor and authored the first book on SIEM.
About Shaun Walsh
Shaun Walsh (@cingulus) leads Cylance’s global marketing strategy, channels, campaigns, digital marketing and communications efforts. Prior to joining Cylance, Shaun served as VP of Corporate Marketing and GM of the Ethernet business unit at QLogic, and previously served as the SVP of Marketing and Corporate Development at Emulex.
// Return false to prevent the submission handler from taking the lead to the follow up url
This is a Security Bloggers Network syndicated blog post authored by Cylance Podcasts. Read the original post at: Cylance Blog