Your Most Valuable & Underutilized Cybersecurity Asset
カートのアイテムが多すぎます
カートに追加できませんでした。
ウィッシュリストに追加できませんでした。
ほしい物リストの削除に失敗しました。
ポッドキャストのフォローに失敗しました
ポッドキャストのフォロー解除に失敗しました
-
ナレーター:
-
著者:
概要
Episode: Your Most Valuable & Underutilized Cybersecurity Asset
Pub date: 2026-04-21
Get Podcast Transcript →
powered by Listen411 - fast audio-to-text and summarization
In this episode, Dino and LuRae address why system integrators, OEMs, and ecosystem partners are often a manufacturer’s most underused cybersecurity resource.
Dino explains why many IT leaders lack real visibility into the plant floor, what it takes to operationalize OT security beyond “checking the box,” and why asset inventory is the first practical step toward protecting control systems.
The conversation also covers the realities of remote access after COVID, the need for governance measures such as change control and auditing, and why manufacturers should build real partner relationships rather than purely transactional vendor engagements.
Chapters:
- (00:00:00) OT security requires time inside the plant, not an “ivory tower” view
- (00:01:00) Introducing Dino and the topic: partners as a cybersecurity asset
- (00:02:00) Why OT assets get excluded from cybersecurity strategy
- (00:03:00) The real opportunity: system integrators and OEMs already in the plant
- (00:05:00) Getting started: identify who’s working in each facility
- (00:08:00) Step one: accurate OT asset inventory and visibility
- (00:10:00) Remote access: detect, audit, and control what partners are doing
- (00:12:00) “Compliance” vs. operational reality on the plant floor
- (00:16:00) Resourcing reality: why most teams cannot self-perform OT security
- (00:20:00) Final advice: budget, ROI of downtime, and act before the incident
Links And Resources:
- Want to Sponsor an episode or be a Guest? Reach out here.
- Industrial Cybersecurity Insider on LinkedIn
- Cybersecurity & Digital Safety on LinkedIn
- BW Design Group Cybersecurity
- Dino Busalachi on LinkedIn
- Craig Duckworth on LinkedIn
Thanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!
The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.