
Securing The Industrial Internet of Things (IIOT): Supply Chain Risks
カートのアイテムが多すぎます
カートに追加できませんでした。
ウィッシュリストに追加できませんでした。
ほしい物リストの削除に失敗しました。
ポッドキャストのフォローに失敗しました
ポッドキャストのフォロー解除に失敗しました
-
ナレーター:
-
著者:
このコンテンツについて
Welcome to "The Connected Frontier," the podcast exploring the cutting edge of technology and its impact on our world. Today, we're continuing the conversation on a topic we started in our first episode: securing the Industrial Internet of Things, or IIoT.
In this episode we explore the critical vulnerabilities within the Industrial Internet of Things (IIoT) supply chain. The discussion highlights how the convergence of IT and OT expands the attack surface, making IIoT susceptible to unique threats. The episode uses real-world examples like the "rogue Raspberry Pi" incident and major supply chain attacks such as SolarWinds, Kaseya, and Codecov to illustrate the insidious nature of these vulnerabilities. Katherine emphasizes that third-party vendors are often the biggest supply chain vulnerability, with 59% of organizations experiencing a data breach due to a third party. The episode concludes by outlining three strategic pillars for securing IIoT environments: rigorous vendor vetting, comprehensive component transparency (including Software Bill of Materials and attestations), and robust Third-Party Risk Management. The host stresses that securing the IIoT ecosystem is a strategic business imperative, crucial for protecting critical infrastructure and the modern economy.