InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Influencing Strategy and Execution without having Authority or Responsibility

Presented by

Carlos Sanchez, Sr. Director, OT, Fortinet & Matt Bunch, Sr. Director of Information Security/Cyber (CISO), Tyson Foods, Inc.

About this talk

For many organizations, cybersecurity ranks in the top five business risks for an organization. This is no surprise given the cyber incidents reported in the headlines putting all organizations on alert. While every employee can act as a first line of defense against a cyberattack, it is often a member of the IT C-suite who owns the security strategy, policy and deployment across an organization. Most would agree there are some security practices that apply to both IT or corporate environments and ICS/OT environments. As cybersecurity raises the risk equation, most organizations realize the two environments need to apply cybersecurity practices appropriate for their priorities. As a leader within an industrial organization, how do you influence security policy when you do not own the strategy? During this webinar, Carlos Sanchez, Sr. Director for OT at Fortinet sits down with Matt Bunch, CISO for Tyson Foods to discuss how you can influence cybersecurity strategy and execution without having the authority or responsibility. From this session, you’ll learn about: - Strategies tried and applied to influence cybersecurity strategy given the different needs of ICS/OT environments - Approaches for navigating change while building consensus - Bridging the gap between people, process and technology
Fortinet Cybersecurity for IT-OT Networks

Fortinet Cybersecurity for IT-OT Networks

1707 subscribers23 talks
Industrial requirements of DX, remote access & converged operations.
For more than a decade, Fortinet has protected OT environments in critical infrastructure sectors such as energy, defense, manufacturing, food, and transportation. By designing security into complex infrastructure via the Fortinet Security Fabric, organizations have an efficient, non-disruptive way to ensure that the OT environment is protected and compliant. Most OT environments run legacy systems and protocols that are sensitive to disruption and lack effective security. Industrial environments once built to operate in isolated networks are now connected to the internet, exposing them to all the threats that plague IT networks. In addition, many OT organizations rely on OEMs and service providers to operate and maintain converged IT/OT networks remotely. This adds risk by both expanding the attack surface and inserting the potential for access by bad actors. The Fortinet Security Fabric seamlessly enables security for converged IT/OT ecosystems. It also provides OT-centric features and products to extend Security-Fabric capabilities to OT networks in factories, plants, remote locations, and ships. To help alleviate security risks across the organization, we’ve continued to enhance our OT security offerings. These innovations range from edge products to NOC and SOC tools and services to ensure effective and efficient networking and cybersecurity performance and operation. Subscribe to stay on top of industry trends and key areas of interest with several sessions including real-life perspectives.
Related topics