Summary of ICIT Briefing: IT's Role in Securing Operational Technology

This is an AI generated summary. There may be inaccuracies.
Summarize another video · Purchase summarize.tech Premium

00:00:00 - 00:25:00

This video discusses the role of IT in securing operational technology. It discusses how medical technology is susceptible to cyberattacks, and how IT is working to secure these systems. The video also discusses the need for IT to partner with other departments within an organization in order to secure operational technology.

  • 00:00:00 This panel discusses the role of information technology in securing operational technology. They discuss how medical technology is susceptible to cyberattacks, and how IT is working to secure these systems.
  • 00:05:00 The author of the video talks about how scary it is when large companies are attacked, and how easy it is for someone to gain access over wireless networks. They talk about how important it is for businesses to have a clear focus on their mission and how the tools and technologies that come to bear really matter. They mention that the challenge going forward is finding the right tools to protect businesses from a variety of threats.
  • 00:10:00 The presenter discusses the need for IT to partner with other departments within an organization in order to secure operational technology. He discusses the importance of NIST 853, which is under rewrite, and the need for a more generic framework for cyber security. He also discusses the challenges of categorizing and inventorying devices.
  • 00:15:00 The video discusses the role of IT in securing operational technology, and discusses how cross-functional teams can help facilitate this. It also discusses the importance of downtime and its impact on money and safety.
  • 00:20:00 This video discusses how IT and OT intersect and how to stay agile in the digital world. It also discusses best practices for managing risk and safeguarding operational technology.
  • 00:25:00 The video discusses the role of IT in securing operational technology, including discussing the restrictions on devices that government is no longer allowed to procure, the publication of guidance on how to vote for manufacturers, and the challenges of incorporating security into devices. It also discusses the need for IT professionals to think about security when acquiring tools, and the need for vendors to be aware of the security needs of their customers.

Copyright © 2024 Summarize, LLC. All rights reserved. · Terms of Service · Privacy Policy · As an Amazon Associate, summarize.tech earns from qualifying purchases.