『Securing The Industrial Internet of Things (IIOT): Supply Chain Risks』のカバーアート

Securing The Industrial Internet of Things (IIOT): Supply Chain Risks

Securing The Industrial Internet of Things (IIOT): Supply Chain Risks

無料で聴く

ポッドキャストの詳細を見る

このコンテンツについて

Welcome to "The Connected Frontier," the podcast exploring the cutting edge of technology and its impact on our world. Today, we're continuing the conversation on a topic we started in our first episode: securing the Industrial Internet of Things, or IIoT.

In this episode we explore the critical vulnerabilities within the Industrial Internet of Things (IIoT) supply chain. The discussion highlights how the convergence of IT and OT expands the attack surface, making IIoT susceptible to unique threats. The episode uses real-world examples like the "rogue Raspberry Pi" incident and major supply chain attacks such as SolarWinds, Kaseya, and Codecov to illustrate the insidious nature of these vulnerabilities. Katherine emphasizes that third-party vendors are often the biggest supply chain vulnerability, with 59% of organizations experiencing a data breach due to a third party. The episode concludes by outlining three strategic pillars for securing IIoT environments: rigorous vendor vetting, comprehensive component transparency (including Software Bill of Materials and attestations), and robust Third-Party Risk Management. The host stresses that securing the IIoT ecosystem is a strategic business imperative, crucial for protecting critical infrastructure and the modern economy.

Securing The Industrial Internet of Things (IIOT): Supply Chain Risksに寄せられたリスナーの声

カスタマーレビュー:以下のタブを選択することで、他のサイトのレビューをご覧になれます。