Can you Zero Trust OT ? I Don’t Trust my Toaster

Presented by

Paul Arceneaux, Mission Secure with, Jon Garside

About this talk

Every CISO knows the OSI Model; however, they and many CIO’s are not aware of the Purdue model for OT & ICS Network Security. Understanding the Purdue Security Model is critical for any CIO, COO, and CISO. This has become the most exploited weak point in current times, for OT target attacks. Chris Inglis, the National Cyber Director has called for US organizations to become “Harder Targets” based on this wide-scale vulnerability landscape. In this session, Paul Arceneaux, VP Mission Secure, will discuss the Purdue Security Model, and its flaws in a world where the boundaries between OT and IOT become increasingly blurred, leaving networks insecure, and with it vulnerable for attack. Citing his 25 years of experience in the SaaS / PaaS / IaaS - Networking Security field, he will discuss the operational issues of enterprise topography, asset discovery, asset control, and access security. The key takeaways you will learn from this session are: 1. The difference between Greenfield and Brownfield in a hyper converged environment 2. How to quantify risks in the cyberphysical environment 3. Best practice for operational and security efficiency This is an interactive session, so please bring coffee and questions.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (3)
Subscribers (581)
Mission Secure is a Gartner Cool Vendor, established in 2014, a leader in OT Security for the Enterprise, Energy, and Defense sectors. The Mission Secure OT & ICS Platform protects infrastructure as diverse as Airforce Drones to Smartcity traffic systems, from Maritime deployments to Energy producers. Mission Secure automates the discovery, visibility, response, and protection of ICS & OT assets, provides an analytic driven data stream to client or partner Security Operations Center, for verification or response. Mission Secure is setting a new standard in OT cyber-protection stopping OT cyber threats head-on. Follow this channel to be the first to gain insights and details of our research, experiences and technology. For more information, visit our website