Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

Ahead of the Breach

MillerKnoll’s Al Imran Husain on Securing IT and OT in Manufacturing

08 Oct 2024

Description

In this episode of Ahead of the Breach, Casey speaks with Al Imran Husain, CISO & VP of Global Infrastructure at MillerKnoll. Al Imran shares his journey into cybersecurity and discusses the unique challenges faced by manufacturing companies, particularly the convergence of IT and OT systems.    He emphasizes the importance of implementing robust security measures, such as network segmentation and user access controls, to protect critical infrastructure. Al Imran also highlights the growing threat of social engineering attacks and the need for effective security awareness training.   Topics discussed:   The unique cybersecurity challenges faced by manufacturing companies, particularly the integration of operational technology (OT) with information technology (IT). The Purdue model, which outlines different layers of operational technology and its implications for cybersecurity in manufacturing environments. The importance of network segmentation to protect critical systems and prevent unauthorized access in manufacturing operations. Proactive vulnerability management strategies, including scanning for weaknesses and implementing automation to streamline the process. The necessity of strict user access controls to ensure that only authorized personnel can access sensitive operational technology environments. The rising threat of social engineering attacks and the importance of security awareness training for employees at all levels. The significance of understanding cybersecurity fundamentals, including networking and infrastructure, as a foundation for effective security practices. The role of artificial intelligence in enhancing vulnerability management and improving overall cybersecurity posture in manufacturing. Advice for CISOs to engage with leadership teams to raise awareness about cybersecurity issues and ensure organizational support for security initiatives. 

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.