{"type":"rich","version":"1.0","provider_name":"Transistor","provider_url":"https://transistor.fm","author_name":"Manufacturing Hub","title":"Ep. 96 - [Kyle McMillan] Understanding & Securing your IT-OT Convergence!","html":"<iframe width=\"100%\" height=\"180\" frameborder=\"no\" scrolling=\"no\" seamless src=\"https://share.transistor.fm/e/9762f4fb\"></iframe>","width":"100%","height":180,"duration":4460,"description":"Guest Bio - Kyle McMillanKyle has a background in Electrical Engineering & control systems. As his responsibilities at Siemens expanded to include industrial networks anda industrial cybersecurity, Kyle developed a passion for cybersecurity and a deep understanding of IT / OT challenges in manufacturing. As a product security officer at Siemens, Kyle is responsible for establishing best practices that protect internal systems and those of end-users of Siemens products.From open ports to air-gapped systems, and DMZ's - should we care about Cybersecurity?Yes, we should, and Kyle McMillan should tell us all about it.As we kick off IT-OT Convergence and maybe IT v OT, we know a couple of things:1) We'll be talking about secret laptops.2) We need to find a way to secure our systems. Bring your cyber questions as we welcome Kyle to the show!A special thank you to Siemens for sponsoring this theme and your continued support of the community!Manufacturing Hub Episode 96. Be sure not to miss this great conversation.Recommended MaterialsThe Colour of Magic: DiscworldGuards! Guards!: DiscworldConnect with UsKyle McMillanVlad RomanovDave GriffithManufacturing HubSolisPLCChapters ⏱️0:00 - 2:32 Intro2:33 - 6:37 Background6:38 - 11:32 Deterministic protocols?11:33 - 13:27 Niches challenges in manufacturing13:28 - 16:01 Shifting to cybersecurity16:02 - 17:59 The learning curve in cybersecurity18:00 - 19:59 Training courses20:00 - 24:22 Customers and the IT convergence24:23 - 27:12 Checkbox security27:13 - 30:05 Starting points to audit and understanding a system30:06 - 36:58 Frameworks and starting points for cybersecurity36:59 - 41:19 People in charge of cybersecurity41:20 - 42:27 Sponsored content42:28 - 46:08 Shadow IT46:07 - 49:54 Adequate security training in IT and OT49:55 - 53:55 Managing the appetite for automation and workforce53:56 - 59:24 Effort and ROI in cybersecurity59:25 - 1:02:01 Protection level on the production floors1:02:02 - 1:03:52 Having an in-house IT...","thumbnail_url":"https://img.transistorcdn.com/yoKAvzBXZ3YjQTekFk7KFGXeuwJ29WgXvop3dVEfhLs/rs:fill:0:0:1/w:400/h:400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/LzE3MjEzLzE2MDk0/MzA1OTgtYXJ0d29y/ay5qcGc.webp","thumbnail_width":300,"thumbnail_height":300}