Zero Trust in OT does not start at the HMI
カートのアイテムが多すぎます
カートに追加できませんでした。
ウィッシュリストに追加できませんでした。
ほしい物リストの削除に失敗しました。
ポッドキャストのフォローに失敗しました
ポッドキャストのフォロー解除に失敗しました
-
ナレーター:
-
著者:
概要
Zero Trust in OT does not start at the HMI
That is why mature OT security does not force cloud-style identity into the final device when the device, and the workflow around it, were never built for it.
🎯 IN THIS EPISODE:
• Zero Trust architecture in OT environments
• Automotive and connected vehicle security
• AI and machine learning security risks
• Identity and credential-based attacks
• Authentication and access control weaknesses
📋 KEY TOPICS COVERED:
• OT Security
• Zero Trust Architecture
• Automotive Security
• AI Security
• Credential-Based Attacks
🔑 KEY INSIGHTS:
1. Zero Trust in OT does not start at the HMI
2. It starts where incentives break traceability
3. On an automotive assembly line, asking every operator to use strict modern identity on a shared HMI looks great on a slide
🔧 TECHNOLOGIES & STANDARDS:
ISO • IEC • HMI • ECU
👥 WHO SHOULD LISTEN:
This episode is perfect for CISOs, OT security engineers, infrastructure operators, compliance officers, cybersecurity consultants, and anyone responsible for protecting critical systems.
💡 WHAT YOU WILL LEARN:
• How real attacks unfold in OT/ICS environments
• Practical defense strategies you can implement today
• Compliance considerations (NIS2, IEC 62443, NIST)
• Lessons from recent high-profile incidents
🎧 SUBSCRIBE & CONNECT:
Subscribe for weekly deep dives into real cybersecurity incidents affecting OT, ICS, and critical infrastructure. New episodes every week.
💬 ENGAGE WITH US:
Have questions or topics you'd like us to cover? Reach out! We love hearing from our community.
#OTSecurity #OperationalTechnology #AutomotiveSecurity #ConnectedCar #ZeroTrust #IdentitySecurity #AISecurity #MachineLearning #Authentication #CyberSecurity #InfoSec #CybersecurityUnderPressure