Governance & Risk Management , Legacy Infrastructure Security , Operational Technology (OT)

IT-OT Convergence: Taking the Right Security Measures

Meralco's Mel Migriño on How to Ensure OT Security
Mel Migriño, vice president and group CISO at Meralco

In addition to doing asset inventory, it is important to profile the risks of each asset to ensure OT security, says Mel Migriño, vice president and group CISO at Meralco, the largest power distribution unit in the Philippines. (See: Applying 'Zero Trust' to OT Environment).

See Also: 2021 Energy, Utilities, and Industrials Cyber Threat Landscape Report

"It is important to identify security risks with each asset and how they can impact your current environment, assuming these threats are actually realized. And then once you have that, then you should design appropriate controls," she says.

In a video interview with Information Security Media Group, Migriño discusses:

  • How the threat landscape is evolving with IT-OT convergence;
  • Detection of anomalies in an OT environment;
  • The various security steps for OT security.

Migriño is the vice president and group CISO of Meralco, the largest power distribution conglomerate in the Philippines. She has more than 15 years of combined experience in cyber governance, application and infrastructure security, operational technology security, business continuity, privacy, IT audit, and project management across multiple industries.


About the Author

Suparna Goswami

Suparna Goswami

Associate Editor, ISMG

Goswami has more than 10 years of experience in the field of journalism. She has covered a variety of beats including global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia, where she wrote about the Indian startup ecosystem. She has also worked with UK-based International Finance Magazine and leading Indian newspapers, such as DNA and Times of India.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.