Access Management , Advanced SOC Operations / CSOC , Analytics

Overcoming the Security Risks of IT and OT Convergence

OPSWAT's Ivan Issac on Protecting Systems, Using the SOC to Beef Up OT Security
Ivan Issac, country general manager for India and the SAARC region, OPSWAT

As IT and OT systems converge with the adoption of Industry 4.0, the security risk to OT systems and IoT devices is high. To secure the enterprise, organizations need network segmentation tools to scan for malicious content across the OT environment, says Ivan Issac, country general manager for India and the SAARC region at OPSWAT.

See Also: Real-World Strategies for Securing Remote Workforces and Data

"We recommend using unidirectional security gateway solutions along with a multi-level protection mechanism - a Purdue model that helps in the network segmentation process of scanning the removable media files that are clean from malicious data," Issac advised.

In this video interview with Information Security Media Group at ISMG's Bengaluru Cybersecurity Summit,Issac also discusses:

  • Protecting legacy systems from attackers;
  • A multi-level protection approach to OT/IT threats;
  • Integration of OT and threat monitoring in the security operations center.

Isaac is the regional sales manager - India and SAARC, OPSWAT. He has more than 25 years of experience leading sales, pre-sales, project management and service delivery teams. Prior to joining OWASPT, he was the regional sales manager at Spirent Communications.


About the Author

Geetha Nandikotkur

Geetha Nandikotkur

Vice President - Conferences, Asia, Middle East and Africa, ISMG

Nandikotkur is an award-winning journalist with over 20 years of experience in newspapers, audiovisual media, magazines and research. She has an understanding of technology and business journalism and has moderated several roundtables and conferences, in addition to leading mentoring programs for the IT community. Prior to joining ISMG, Nandikotkur worked for 9.9 Media as a group editor for CIO & Leader, IT Next and CSO Forum.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.