<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cybersecurity &#8211; Industrial Talk</title>
	<atom:link href="https://industrialtalk.com/captivate-tag/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://industrialtalk.com</link>
	<description>Where Industry Meets the Power of Media</description>
	<lastBuildDate>Mon, 18 Aug 2025 15:00:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://industrialtalk.com/wp-content/uploads/2022/10/cropped-Favicon-IT-Rebrand-32x32.png</url>
	<title>cybersecurity &#8211; Industrial Talk</title>
	<link>https://industrialtalk.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Adile Ajaja with EVLO Energy Storage</title>
		<link>https://industrialtalk.com/episodes/adile-ajaja-with-evloenergy-storage/</link>
					<comments>https://industrialtalk.com/episodes/adile-ajaja-with-evloenergy-storage/#respond</comments>
		
		<dc:creator><![CDATA[Scott MacKenzie]]></dc:creator>
		<pubDate>Mon, 18 Aug 2025 15:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://industrialtalk.com/captivate-podcast/adile-ajaja-with-evloenergy-storage/</guid>

					<description><![CDATA[<p>Industrial Talk is onsite at DistribuTech 2025 and talking to Adile Ajaja, Director of Digital Technology at EVLO Energy about "Securing Energy Storage".</p>
<p>Scott MacKenzie hosts an industrial podcast featuring Adile, an electrical engineer and expert in grid-scale energy storage systems. Adil discusses his background with Hydro Quebec and the evolution of his company, EVLO, which focuses on innovative and cost-efficient energy solutions. They delve into the importance of cybersecurity in energy systems, emphasizing a life-cycle approach to protect against attacks and failures. Adile highlights the challenges of integrating legacy systems with modern cybersecurity measures, as well as the increasing demand for power due to data centers and AI processing. He also touches on Hydro Quebec's strategies to manage this demand through efficiency and renewable energy sources.</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/adile-ajaja-with-evloenergy-storage/">Adile Ajaja with EVLO Energy Storage</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="cfm-player-iframe" style="width: 100%; height: 170px; margin-bottom: 20px; border-radius: 10px; overflow:hidden; border: 1px solid #d6d6d6;"><iframe style="width: 100%; height: 170px;" frameborder="no" scrolling="no" seamless allow="autoplay" src="https://player.captivate.fm/73f216e8-6f44-49dd-87e0-6aa595c4e173"></iframe></div><p><strong><em>Industrial Talk </em></strong>is onsite at <a href="https://www.distributech.com/">DistribuTech 2025</a> and talking to <strong>Adile Ajaja, Director of Digital Technology at EVLO Energy </strong>about &#8220;Securing Energy Storage&#8221;<strong>.</strong></p>
<div>
<div>
<div>
<p>Scott MacKenzie hosts an industrial podcast featuring Adile, an electrical engineer and expert in grid-scale energy storage systems. Adil discusses his background with Hydro Quebec and the evolution of his company, EVLO, which focuses on innovative and cost-efficient energy solutions. They delve into the importance of cybersecurity in energy systems, emphasizing a life-cycle approach to protect against attacks and failures. Adile highlights the challenges of integrating legacy systems with modern cybersecurity measures, as well as the increasing demand for power due to data centers and AI processing. He also touches on Hydro Quebec's strategies to manage this demand through efficiency and renewable energy sources.</p>
<h2>Action Items</h2>
<ul>
<li>[ ] Reach out to Adil on LinkedIn to connect and learn more about EVLO's energy storage solutions and cybersecurity approaches.</li>
</ul>
<h2>Outline</h2>
<h3>Introduction and Podcast Overview</h3>
<ul>
<li>Scott MacKenzie introduces the Industrial Talk podcast, emphasizing its focus on industry professionals and their innovations.</li>
<li>Scott mentions the new intro and the sponsorship by Siemens, highlighting their role in solving distribution and transmission challenges.</li>
<li>Scott introduces the guest, Adile, and discusses the conference's energy and the challenges in the industry.</li>
<li>Adil shares his background, mentioning his work with Hydro Quebec and his involvement in smart grids and energy storage systems.</li>
</ul>
<h3>Adile's Background and EVLO's Mission</h3>
<ul>
<li>Adile explains his career path, starting as a power system engineer at Hydro Quebec and working on smart grids.</li>
<li>He describes the joint venture between Hydro Quebec and Sony to create grid-scale energy storage systems.</li>
<li>Adile details the evolution of the company, from a joint venture to a fully capable commercial operation called EVLO.</li>
<li>Evelo's mission is to provide innovative and cost-efficient energy solutions to utility customers, integrating electrical, mechanical, and software engineering.</li>
</ul>
<h3>Cybersecurity in Energy Storage Systems</h3>
<ul>
<li>Scott and Adile discuss the importance of cybersecurity in energy storage systems, emphasizing the need for digitalization and data protection.</li>
<li>Adile explains the cybersecurity measures implemented at each stage of the product life cycle, from design to operation.</li>
<li>They discuss the challenges of protecting legacy systems and the role of NERC in ensuring grid stability and cybersecurity.</li>
<li>Adil highlights the importance of creating a secure perimeter around energy assets and conducting regular audits and penetration tests.</li>
</ul>
<h3>Addressing Increased Demand for Power</h3>
<ul>
<li>Scott and Adile discuss the increasing demand for power due to data centers, AI processing, and other technological advancements.</li>
<li>Adile explains Hydro Quebec's strategies to address this demand, including demand response programs and the installation of electronic devices to control energy consumption.</li>
<li>They discuss the challenges of balancing generation and demand, especially during peak periods.</li>
<li>Adile mentions the shift towards renewable energy sources and the need for cybersecurity in these systems.</li>
</ul>
<h3>Future Insights and Contact Information</h3>
<ul>
<li>Scott asks Adile about his future insights on energy demand and cybersecurity.</li>
<li>Adil predicts continued growth in energy demand due to population growth and technological advancements.</li>
<li>He emphasizes the importance of renewable energy sources and the need for cybersecurity in these systems.</li>
<li>Adile provides his contact information, recommending LinkedIn as the best way to reach him.</li>
<li>Scott concludes the podcast, encouraging listeners to reach out to Adile and highlighting the importance of cybersecurity in the energy and utility space.</li>
</ul>
</div>
</div>
</div>
<p>If interested in being on the Industrial Talk show, simply <strong><a href="https://industrialtalk.com/contact/" target="_blank" rel="noopener">contact us</a></strong> and let's have a quick conversation.</p>
<p>Finally, get your exclusive free access to the <a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener">Industrial Academy</a> and a series on “<a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener"><strong>Why You Need To Podcast</strong></a>” for Greater Success in 2025. All links designed for keeping you current in this rapidly changing Industrial Market. Learn! Grow! Enjoy!</p>
<h2>ADILE AJAJA'S CONTACT INFORMATION:</h2>
<p><strong>Personal LinkedIn: </strong><a href="https://www.linkedin.com/in/adile-ajaja/" target="_blank" rel="noopener">https://www.linkedin.com/in/adile-ajaja/</a></p>
<p><strong>Company LinkedIn:</strong> <a href="https://www.linkedin.com/company/evloenergie/" target="_blank" rel="noopener">https://www.linkedin.com/company/evloenergie/</a></p>
<p><strong>Company Website:</strong> <a href="https://evloenergy.com/" target="_blank" rel="noopener">https://evloenergy.com/</a></p>
<h2>PODCAST VIDEO:</h2>
<p><iframe title="Adile Ajaja | @evloenergystorage | Hydro Quebec | DTech | Securing Critical Battery Storage" width="500" height="281" src="https://www.youtube.com/embed/529Y4hCw8YU?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>THE STRATEGIC REASON &#8220;WHY YOU NEED TO PODCAST&#8221;:</h2>
<p><a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener"><img fetchpriority="high" decoding="async" src="https://industrialtalk.com/wp-content/uploads/2020/02/Why-you-need-to-Podcast-Graphic-2.png" width="1024" height="538" /></a></p>
<h2>OTHER GREAT INDUSTRIAL RESOURCES:</h2>
<p><strong>NEOM</strong>: <a href="https://www.neom.com/en-us" target="_blank" rel="noopener">https://www.neom.com/en-us</a></p>
<p><strong>Hexagon:</strong> <a href="https://hexagon.com/" target="_blank" rel="noopener">https://hexagon.com/</a></p>
<p><strong>Arduino:</strong> <a href="https://www.arduino.cc/" target="_blank" rel="noopener">https://www.arduino.cc/</a></p>
<p><strong>Fictiv:</strong> <a href="https://www.fictiv.com/" target="_blank" rel="noopener">https://www.fictiv.com/</a></p>
<p><strong>Hitachi Vantara:</strong> <a href="https://www.hitachivantara.com/en-us/home.html" target="_blank" rel="noopener">https://www.hitachivantara.com/en-us/home.html</a></p>
<p><strong>Industrial Marketing Solutions:</strong>  <a href="https://industrialtalk.com/industrial-marketing/" target="_blank" rel="noopener">https://industrialtalk.com/industrial-marketing/</a></p>
<p><strong>Industrial Academy:</strong> <a href="https://industrialtalk.com/industrial-academy/" target="_blank" rel="noopener">https://industrialtalk.com/industrial-academy/</a></p>
<p><strong>Industrial Dojo:</strong> <a href="https://industrialtalk.com/industrial_dojo/" target="_blank" rel="noopener">https://industrialtalk.com/industrial_dojo/</a></p>
<p><strong>We the 15:</strong><a href="https://www.wethe15.org/" target="_blank" rel="noopener"> https://www.wethe15.org/</a></p>
<h2>YOUR INDUSTRIAL DIGITAL TOOLBOX:</h2>
<p><strong>LifterLMS:</strong> Get One Month Free for $1 – <a href="https://lifterlms.com/" target="_blank" rel="noopener">https://lifterlms.com/</a></p>
<p><strong>Active Campaign:</strong> <a href="https://www.activecampaign.com/?_r=H855VEPU" target="_blank" rel="noopener">Active Campaign Link</a></p>
<p><strong>Social Jukebox:</strong> <a href="https://www.socialjukebox.com/" target="_blank" rel="noopener">https://www.socialjukebox.com/</a></p>
<h2>Industrial Academy (One Month Free Access And One Free License For Future Industrial Leader):</h2>
<p><a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener"><img decoding="async" src="https://industrialtalk.com/wp-admin/wp-content/uploads/2019/10/Industrial-Academy-Graphic.png" width="1024" height="538" /></a></p>
<h2>Business Beatitude the Book</h2>
<p><img loading="lazy" decoding="async" class="alignleft" src="https://industrialtalk.com/wp-content/uploads/2019/10/BB-Book-Cover.png" width="138" height="215" /></p>
<p class="ql-align-center">Do you desire a more joy-filled, deeply-enduring sense of accomplishment and success? Live your business the way you want to live with the BUSINESS BEATITUDES&#8230;The Bridge connecting sacrifice to success. <strong>YOU NEED THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><strong>TAP INTO YOUR INDUSTRIAL SOUL, RESERVE YOUR COPY NOW! BE BOLD. BE BRAVE. DARE GREATLY AND CHANGE THE WORLD. GET THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><a href="https://industrialtalk.com/business-beatitude-reserve/" target="_blank" rel="noopener"> Reserve My Copy and My 25% Discount</a></p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/adile-ajaja-with-evloenergy-storage/">Adile Ajaja with EVLO Energy Storage</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://industrialtalk.com/episodes/adile-ajaja-with-evloenergy-storage/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://podcasts.captivate.fm/media/b7902f20-3576-4598-a664-9c238aeae9ea/Adile-Ajaja-Conversation-converted.mp3" length="35885187" type="audio/mpeg" />

			</item>
		<item>
		<title>Sandy Carielli with Forrester Research</title>
		<link>https://industrialtalk.com/episodes/sandy-carrielli-with-forrester-research/</link>
					<comments>https://industrialtalk.com/episodes/sandy-carrielli-with-forrester-research/#respond</comments>
		
		<dc:creator><![CDATA[Scott MacKenzie]]></dc:creator>
		<pubDate>Fri, 15 Aug 2025 15:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://industrialtalk.com/captivate-podcast/sandy-carrielli-with-forrester-research/</guid>

					<description><![CDATA[<p>Industrial Talk is talking to Sandy Carielli, Vice President at Forrester Research about "Quantum Computing Cybersecurity".</p>
<p>Scott Mackenzie and Sandy Carielli discuss the implications of quantum computing on cybersecurity. Quantum computers could potentially break today's public key cryptography, compromising data security. Carielli highlights the importance of transitioning to new, quantum-resistant algorithms, such as those developed by NIST. She emphasizes the urgency for organizations, especially government agencies and financial institutions, to start this migration process. Carielli also warns of the "harvest now, decrypt later" attack scenario, where data is intercepted today and decrypted later with a future quantum computer. The conversation underscores the need for proactive measures to ensure digital trust and security.</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/sandy-carrielli-with-forrester-research/">Sandy Carielli with Forrester Research</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="cfm-player-iframe" style="width: 100%; height: 170px; margin-bottom: 20px; border-radius: 10px; overflow:hidden; border: 1px solid #d6d6d6;"><iframe style="width: 100%; height: 170px;" frameborder="no" scrolling="no" seamless allow="autoplay" src="https://player.captivate.fm/63d8b524-2ad2-4c6c-98f2-178fd37a2926"></iframe></div><p><strong><em>Industrial Talk </em></strong>is talking to <strong>Sandy Carielli, Vice President at Forrester Research </strong>about &#8220;<span class="OYPEnA font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none">Quantum Computing Cybersecurity</span>&#8220;<strong>.</strong></p>
<div>
<p>Scott Mackenzie and Sandy Carielli discuss the implications of quantum computing on cybersecurity. Quantum computers could potentially break today's public key cryptography, compromising data security. Carielli highlights the importance of transitioning to new, quantum-resistant algorithms, such as those developed by NIST. She emphasizes the urgency for organizations, especially government agencies and financial institutions, to start this migration process. Carielli also warns of the &#8220;harvest now, decrypt later&#8221; attack scenario, where data is intercepted today and decrypted later with a future quantum computer. The conversation underscores the need for proactive measures to ensure digital trust and security.</p>
<h2>Action Items</h2>
<ul>
<li>[ ] Conduct a cryptographic discovery exercise to inventory the algorithms and protocols currently in use across the organization.</li>
<li>[ ] Bring together a cross-functional team to assess the organization's exposure to quantum computing threats and start the process of migrating to post-quantum cryptography.</li>
<li>[ ] Incorporate requirements for quantum-resistant cryptography in procurement processes and vendor SLAs.</li>
<li>[ ] Prioritize the migration of high-value, long-term data and systems that rely on digital signatures.</li>
</ul>
<h2>Outline</h2>
<h3>Introduction and Purpose of Industrial Talk Podcast</h3>
<ul>
<li>Scott MacKenzie thanks listeners for their support and highlights the platform's dedication to celebrating achievements and amplifying messages.</li>
<li>Scott MacKenzie praises Sandy Carielli from Forrester Research for her contributions to quantum computing and cybersecurity.</li>
<li>The conversation aims to explore the transformative impact of quantum computing on cybersecurity.</li>
</ul>
<h3>Scott MacKenzie's Perspective on Innovation and Technology</h3>
<ul>
<li>Scott MacKenzie discusses the importance of creating content and demonstrating the human side of professionals in various industries.</li>
<li>He emphasizes the need for companies to adapt to new technologies and innovations to remain successful.</li>
<li>Scott MacKenzie shares themes from his conversations with industrial leaders, such as the importance of education, collaboration, and innovation.</li>
<li>He highlights the need for companies to be nimble, trusted, and passionate about solving challenges.</li>
</ul>
<h3>Introduction to Sandy Carielli and Quantum Computing</h3>
<ul>
<li>Scott MacKenzie introduces Sandy Carielli and her work at Forrester Research on quantum computing and cybersecurity.</li>
<li>Sandy Carielli explains the process of selecting topics for research at Forrester, including trends, market exposure, and regulatory changes.</li>
<li>The conversation touches on the rapid evolution of technologies and the importance of staying current.</li>
<li>Sandy Carielli mentions the annual top 10 emerging technologies report published by Forrester.</li>
</ul>
<h3>Quantum Computing and Its Impact on Cybersecurity</h3>
<ul>
<li>Sandy Carielli provides an overview of quantum computing and its potential to break today's public key cryptography.</li>
<li>She explains the concept of public key cryptography and its role in securing communications and transactions.</li>
<li>The discussion covers the potential risks posed by nation-states developing quantum computers and the need for cybersecurity measures.</li>
<li>Sandy Carielli highlights the efforts to develop new cryptographic algorithms resistant to quantum computers.</li>
</ul>
<h3>Preparing for Quantum Computing and Cybersecurity Measures</h3>
<ul>
<li>Sandy Carielli discusses the &#8220;harvest now, decrypt later&#8221; attack scenario and the importance of prioritizing data that will remain valuable in the future.</li>
<li>She emphasizes the need for organizations to migrate to new cryptographic algorithms to protect their data.</li>
<li>The conversation covers the role of government agencies and financial institutions in leading the migration to quantum-resistant algorithms.</li>
<li>Sandy Carielli advises organizations to conduct cryptographic discovery to identify and prioritize the algorithms in their environment.</li>
</ul>
<h3>Challenges and Practical Steps for Quantum-Resistant Security</h3>
<ul>
<li>Scott MacKenzie and Sandy Carielli discuss the challenges of getting stakeholders in an organization to recognize and address quantum computing risks.</li>
<li>Sandy Carielli highlights the importance of involving various departments, such as development, infrastructure, and procurement, in the migration process.</li>
<li>The conversation covers the need for organizations to ensure their vendors and partners are quantum-ready.</li>
<li>Sandy Carielli mentions the role of regulatory bodies in mandating migration timelines to ensure compliance.</li>
</ul>
<h3>Future of Quantum Computing and Its Applications</h3>
<ul>
<li>Scott MacKenzie and Sandy Carielli discuss the potential timeline for the development of practical quantum computers.</li>
<li>Sandy Carielli shares insights from cryptographers and experts predicting a timeline of under 10 years for significant advancements.</li>
<li>The conversation touches on the potential for quantum computers to accelerate deep analysis in fields like pharmaceuticals and drug development.</li>
<li>Sandy Carielli emphasizes the importance of addressing digital signatures to maintain trust and non-repudiation in digital communications.</li>
</ul>
<h3>Conclusion and Call to Action</h3>
<ul>
<li>Scott MacKenzie wraps up the conversation by expressing his admiration for Sandy Carielli's expertise and insights.</li>
<li>He encourages listeners to connect with Sandy Carielli and stay informed about quantum computing and cybersecurity.</li>
<li>Scott MacKenzie highlights the importance of being proactive and prepared for future technological advancements.</li>
<li>The conversation ends with a call to action for organizations to start the migration process and ensure their systems are quantum-resistant.</li>
</ul>
</div>
<p>If interested in being on the Industrial Talk show, simply <strong><a href="https://industrialtalk.com/contact/" target="_blank" rel="noopener">contact us</a></strong> and let's have a quick conversation.</p>
<p>Finally, get your exclusive free access to the <a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener">Industrial Academy</a> and a series on “<a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener"><strong>Why You Need To Podcast</strong></a>” for Greater Success in 2025. All links designed for keeping you current in this rapidly changing Industrial Market. Learn! Grow! Enjoy!</p>
<h2>SANDY CARIELLI'S CONTACT INFORMATION:</h2>
<p><strong>Personal LinkedIn: </strong><a href="https://www.linkedin.com/in/sandra-carielli-251599/" target="_blank" rel="noopener">https://www.linkedin.com/in/sandra-carielli-251599/</a></p>
<p><strong>Sandy's Latest Blog:</strong>  <a href="https://www.forrester.com/blogs/author/sandy_carielli/">Sandy Carielli &#8211; Forrester</a></p>
<p><strong>Company LinkedIn:</strong> <a href="https://www.linkedin.com/company/forrester-research/" target="_blank" rel="noopener">https://www.linkedin.com/company/forrester-research/</a></p>
<p><strong>Company Website:</strong> <a href="https://www.forrester.com/bold/?utm_source=linkedin&utm_medium=social" target="_blank" rel="noopener">https://www.forrester.com/bold/?utm_source=linkedin&utm_medium=social</a></p>
<h2>PODCAST VIDEO:</h2>
<p><iframe loading="lazy" title="Sandy Carielli | @forrester | #quantumsecurity | Protecting Public Key Cryptograph" width="500" height="281" src="https://www.youtube.com/embed/nV26umIOmJE?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>THE STRATEGIC REASON &#8220;WHY YOU NEED TO PODCAST&#8221;:</h2>
<p><a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-content/uploads/2020/02/Why-you-need-to-Podcast-Graphic-2.png" width="1024" height="538" /></a></p>
<h2>OTHER GREAT INDUSTRIAL RESOURCES:</h2>
<p><strong>NEOM</strong>: <a href="https://www.neom.com/en-us" target="_blank" rel="noopener">https://www.neom.com/en-us</a></p>
<p><strong>Hexagon:</strong> <a href="https://hexagon.com/" target="_blank" rel="noopener">https://hexagon.com/</a></p>
<p><strong>Arduino:</strong> <a href="https://www.arduino.cc/" target="_blank" rel="noopener">https://www.arduino.cc/</a></p>
<p><strong>Fictiv:</strong> <a href="https://www.fictiv.com/" target="_blank" rel="noopener">https://www.fictiv.com/</a></p>
<p><strong>Hitachi Vantara:</strong> <a href="https://www.hitachivantara.com/en-us/home.html" target="_blank" rel="noopener">https://www.hitachivantara.com/en-us/home.html</a></p>
<p><strong>Industrial Marketing Solutions:</strong>  <a href="https://industrialtalk.com/industrial-marketing/" target="_blank" rel="noopener">https://industrialtalk.com/industrial-marketing/</a></p>
<p><strong>Industrial Academy:</strong> <a href="https://industrialtalk.com/industrial-academy/" target="_blank" rel="noopener">https://industrialtalk.com/industrial-academy/</a></p>
<p><strong>Industrial Dojo:</strong> <a href="https://industrialtalk.com/industrial_dojo/" target="_blank" rel="noopener">https://industrialtalk.com/industrial_dojo/</a></p>
<p><strong>We the 15:</strong><a href="https://www.wethe15.org/" target="_blank" rel="noopener"> https://www.wethe15.org/</a></p>
<h2>YOUR INDUSTRIAL DIGITAL TOOLBOX:</h2>
<p><strong>LifterLMS:</strong> Get One Month Free for $1 – <a href="https://lifterlms.com/" target="_blank" rel="noopener">https://lifterlms.com/</a></p>
<p><strong>Active Campaign:</strong> <a href="https://www.activecampaign.com/?_r=H855VEPU" target="_blank" rel="noopener">Active Campaign Link</a></p>
<p><strong>Social Jukebox:</strong> <a href="https://www.socialjukebox.com/" target="_blank" rel="noopener">https://www.socialjukebox.com/</a></p>
<h2>Industrial Academy (One Month Free Access And One Free License For Future Industrial Leader):</h2>
<p><a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-admin/wp-content/uploads/2019/10/Industrial-Academy-Graphic.png" width="1024" height="538" /></a></p>
<h2>Business Beatitude the Book</h2>
<p><img loading="lazy" decoding="async" class="alignleft" src="https://industrialtalk.com/wp-content/uploads/2019/10/BB-Book-Cover.png" width="138" height="215" /></p>
<p class="ql-align-center">Do you desire a more joy-filled, deeply-enduring sense of accomplishment and success? Live your business the way you want to live with the BUSINESS BEATITUDES&#8230;The Bridge connecting sacrifice to success. <strong>YOU NEED THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><strong>TAP INTO YOUR INDUSTRIAL SOUL, RESERVE YOUR COPY NOW! BE BOLD. BE BRAVE. DARE GREATLY AND CHANGE THE WORLD. GET THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><a href="https://industrialtalk.com/business-beatitude-reserve/" target="_blank" rel="noopener"> Reserve My Copy and My 25% Discount</a></p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/sandy-carrielli-with-forrester-research/">Sandy Carielli with Forrester Research</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://industrialtalk.com/episodes/sandy-carrielli-with-forrester-research/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://podcasts.captivate.fm/media/9e09cd30-8394-4802-9074-e828ad566bbf/Sandy-Carrielli-Conversation-3-converted.mp3" length="70619517" type="audio/mpeg" />

			</item>
		<item>
		<title>Milouni Sheth and Jeff Foley with Siemens</title>
		<link>https://industrialtalk.com/episodes/milouni-sheth-and-jeff-foley-with-siemens/</link>
					<comments>https://industrialtalk.com/episodes/milouni-sheth-and-jeff-foley-with-siemens/#respond</comments>
		
		<dc:creator><![CDATA[Scott MacKenzie]]></dc:creator>
		<pubDate>Wed, 16 Apr 2025 15:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://industrialtalk.com/captivate-podcast/milouni-sheth-and-jeff-foley-with-siemens/</guid>

					<description><![CDATA[<p>Industrial Talk is onsite at DistribuTech 2025 and talking to Milouni Sheth and Jeff Foley with Siemens about "RUGGEDCOM and securing utility assets.</p>
<p>Scott MacKenzie hosts an industrial podcast from Distribute Tech in Dallas, Texas, featuring Jeff and Milouni from Siemens. They discuss the evolution of utility challenges, such as increased costs and digitalization, and the role of technology in addressing these issues. Jeff, with 24 years at Siemens, focuses on cybersecurity for critical infrastructures, while Milouni, with over 20 years in marketing, emphasizes the importance of secure, reliable, and redundant communication solutions. They highlight Siemens' efforts in digital substations, use cases, and AI integration to enhance efficiency and security. The conversation underscores the need for continuous innovation and collaboration in the utility sector.</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/milouni-sheth-and-jeff-foley-with-siemens/">Milouni Sheth and Jeff Foley with Siemens</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="cfm-player-iframe" style="width: 100%; height: 170px; margin-bottom: 20px; border-radius: 10px; overflow:hidden; border: 1px solid #d6d6d6;"><iframe style="width: 100%; height: 170px;" frameborder="no" scrolling="no" seamless allow="autoplay" src="https://player.captivate.fm/2e8f295b-897a-4176-ac10-1aa052c78341"></iframe></div><p><strong><em>Industrial Talk </em></strong>is onsite at <a href="https://www.distributech.com/">DistribuTech 2025</a> and talking to <strong>Milouni Sheth and Jeff Foley with Siemens </strong>about &#8220;RUGGEDCOM and securing utility assets.</p>
<p>Scott MacKenzie hosts an industrial podcast from Distribute Tech in Dallas, Texas, featuring Jeff and Milouni from Siemens. They discuss the evolution of utility challenges, such as increased costs and digitalization, and the role of technology in addressing these issues. Jeff, with 24 years at Siemens, focuses on cybersecurity for critical infrastructures, while Milouni, with over 20 years in marketing, emphasizes the importance of secure, reliable, and redundant communication solutions. They highlight Siemens' efforts in digital substations, use cases, and AI integration to enhance efficiency and security. The conversation underscores the need for continuous innovation and collaboration in the utility sector.</p>
<div>
<h2>Action Items</h2>
<ul>
<li>[ ] Connect with Milouni and Jeff on LinkedIn to discuss Siemens' offerings further.</li>
<li>[ ] Develop more collaboration and communication between interconnected utilities to drive innovation.</li>
<li>[ ] Assess legacy infrastructure and implement segmentation, firewalls, and intrusion detection to add security layers.</li>
<li>[ ] Explore use cases for digital substation solutions to address utility challenges.</li>
<li>[ ] Investigate how AI can be leveraged to enhance cybersecurity and efficiency, while addressing potential risks.</li>
</ul>
<h2>Outline</h2>
<h3>Introduction and Welcome</h3>
<ul>
<li>Scott MacKenzie introduces the Industrial Talk Podcast, emphasizing its focus on industry innovations and professionals.</li>
<li>Scott welcomes listeners and highlights the importance of industry professionals in solving global problems.</li>
<li>The podcast is sponsored by Siemens Smart Infrastructure and Grid Software, encouraging listeners to visit siemens.com for more information.</li>
<li>Scott mentions the current broadcast location at Distribute Tech in Dallas, Texas, and introduces the guests, Jeff and Maloney from Siemens.</li>
</ul>
<h3>Initial Impressions and Conference Overview</h3>
<ul>
<li>Jeff and Milouni express their excitement about the conference, noting its massive scale and high interest in the topics discussed.</li>
<li>Scott comments on the growth of the conference compared to previous years and reflects on the evolution of the utility industry.</li>
<li>Milouni discusses the ongoing challenges faced by utilities, including increased costs and digitalization, and the advancements in technology that help address these challenges.</li>
<li>Scott and Milouni agree on the significant progress made in technology over the past few decades, which has improved the ability to tackle utility issues.</li>
</ul>
<h3>Professional Backgrounds and Roles</h3>
<ul>
<li>Milouni introduces herself, sharing her extensive experience in marketing, particularly in the electric power industry.</li>
<li>Milouni emphasizes the ever-evolving nature of the utility industry and the importance of communication infrastructure in digitalization.</li>
<li>Jeff shares his background, detailing his 24 years at Siemens, focusing on communications, telecom, and cybersecurity for critical infrastructures.</li>
<li>Jeff highlights the constant evolution and changing requirements in the utility sector, which necessitate continuous adaptation and innovation.</li>
</ul>
<h3>Challenges and Solutions in Utility Modernization</h3>
<ul>
<li>Scott and Jeff discuss the challenges of modernizing utilities, including the need for more efficient and cost-effective solutions.</li>
<li>Milouni explains Siemens' approach to helping utilities transition to digital substations, which offers significant benefits in addressing current challenges.</li>
<li>Jeff elaborates on the use cases developed by Siemens to guide customers through the digitalization process, providing architectural and implementation insights.</li>
<li>The conversation touches on the importance of collaboration and communication between utilities and regulatory bodies to drive efficiency and compliance.</li>
</ul>
<h3>Legacy Systems and Security</h3>
<ul>
<li>Scott inquires about the challenges of integrating legacy systems with modern solutions, particularly in terms of security.</li>
<li>Jeff explains that security can be added to existing networks through segmentation and the use of advanced firewalls and intrusion detection systems.</li>
<li>Milouni emphasizes the importance of secure, reliable, and redundant communication solutions in enabling digitalization and ensuring regulatory compliance.</li>
<li>The discussion highlights the need for a holistic approach to cybersecurity, considering both legacy and modern systems.</li>
</ul>
<h3>Future Trends and AI in Utility Management</h3>
<ul>
<li>Milouni discusses the role of AI in enhancing cybersecurity and efficiency in the utility sector.</li>
<li>Scott and Jeff agree on the importance of trusted partners in implementing AI and other advanced technologies.</li>
<li>Jeff mentions Siemens' work on zero-touch and AI solutions, which help automate and secure utility networks.</li>
<li>The conversation underscores the need for continuous improvement and adaptation in cybersecurity and digitalization efforts.</li>
</ul>
<h3>Conclusion and Contact Information</h3>
<ul>
<li>Scott thanks Jeff and Milouni for their insights and contributions to the podcast.</li>
<li>Milouni provides her LinkedIn profile information for listeners interested in connecting with her.</li>
<li>Jeff does the same, encouraging listeners to reach out via LinkedIn for further discussions.</li>
<li>Scott wraps up the podcast, reiterating the importance of the topics discussed and the value of Siemens' solutions in the utility sector.</li>
</ul>
</div>
<p>If interested in being on the Industrial Talk show, simply <strong><a href="https://industrialtalk.com/contact/" target="_blank" rel="noopener">contact us</a></strong> and let's have a quick conversation.</p>
<p>Finally, get your exclusive free access to the <a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener">Industrial Academy</a> and a series on “<a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener"><strong>Why You Need To Podcast</strong></a>” for Greater Success in 2025. All links designed for keeping you current in this rapidly changing Industrial Market. Learn! Grow! Enjoy!</p>
<h2>MILOUUNI SHETH'S CONTACT INFORMATION:</h2>
<p><strong>Personal LinkedIn: </strong><a href="https://www.linkedin.com/in/milounisheth/" target="_blank" rel="noopener">https://www.linkedin.com/in/milounisheth/</a></p>
<p><strong>Company LinkedIn:</strong> <a href="https://www.linkedin.com/company/siemens/posts/?feedView=all" target="_blank" rel="noopener">https://www.linkedin.com/company/siemens/posts/?feedView=all</a></p>
<p><strong>Company Website:</strong> <a href="https://www.siemens.com/global/en.html" target="_blank" rel="noopener">https://www.siemens.com/global/en.html</a></p>
<h2>JEFF FOLEY'S CONTACT INFORMATION:</h2>
<p><strong>Personal LinkedIn: </strong><a href="https://www.linkedin.com/in/jeff-foley-4042362/" target="_blank" rel="noopener">https://www.linkedin.com/in/jeff-foley-4042362/</a></p>
<h2>PODCAST VIDEO:</h2>
<p><iframe loading="lazy" title="Jeff Foley | Milouni Sheth | Siemens | DistribuTech | RUGGEDCOM Solution | Protecting Utility Assets" width="500" height="281" src="https://www.youtube.com/embed/ZCAV97PubYQ?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>THE STRATEGIC REASON &#8220;WHY YOU NEED TO PODCAST&#8221;:</h2>
<p><a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-content/uploads/2020/02/Why-you-need-to-Podcast-Graphic-2.png" width="1024" height="538" /></a></p>
<h2>OTHER GREAT INDUSTRIAL RESOURCES:</h2>
<p><strong>NEOM</strong>: <a href="https://www.neom.com/en-us" target="_blank" rel="noopener">https://www.neom.com/en-us</a></p>
<p><strong>Hexagon:</strong> <a href="https://hexagon.com/" target="_blank" rel="noopener">https://hexagon.com/</a></p>
<p><strong>Arduino:</strong> <a href="https://www.arduino.cc/" target="_blank" rel="noopener">https://www.arduino.cc/</a></p>
<p><strong>Fictiv:</strong> <a href="https://www.fictiv.com/" target="_blank" rel="noopener">https://www.fictiv.com/</a></p>
<p><strong>Hitachi Vantara:</strong> <a href="https://www.hitachivantara.com/en-us/home.html" target="_blank" rel="noopener">https://www.hitachivantara.com/en-us/home.html</a></p>
<p><strong>Industrial Marketing Solutions:</strong>  <a href="https://industrialtalk.com/industrial-marketing/" target="_blank" rel="noopener">https://industrialtalk.com/industrial-marketing/</a></p>
<p><strong>Industrial Academy:</strong> <a href="https://industrialtalk.com/industrial-academy/" target="_blank" rel="noopener">https://industrialtalk.com/industrial-academy/</a></p>
<p><strong>Industrial Dojo:</strong> <a href="https://industrialtalk.com/industrial_dojo/" target="_blank" rel="noopener">https://industrialtalk.com/industrial_dojo/</a></p>
<p><strong>We the 15:</strong><a href="https://www.wethe15.org/" target="_blank" rel="noopener"> https://www.wethe15.org/</a></p>
<h2>YOUR INDUSTRIAL DIGITAL TOOLBOX:</h2>
<p><strong>LifterLMS:</strong> Get One Month Free for $1 – <a href="https://lifterlms.com/" target="_blank" rel="noopener">https://lifterlms.com/</a></p>
<p><strong>Active Campaign:</strong> <a href="https://www.activecampaign.com/?_r=H855VEPU" target="_blank" rel="noopener">Active Campaign Link</a></p>
<p><strong>Social Jukebox:</strong> <a href="https://www.socialjukebox.com/" target="_blank" rel="noopener">https://www.socialjukebox.com/</a></p>
<h2>Industrial Academy (One Month Free Access And One Free License For Future Industrial Leader):</h2>
<p><a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-admin/wp-content/uploads/2019/10/Industrial-Academy-Graphic.png" width="1024" height="538" /></a></p>
<h2>Business Beatitude the Book</h2>
<p><img loading="lazy" decoding="async" class="alignleft" src="https://industrialtalk.com/wp-content/uploads/2019/10/BB-Book-Cover.png" width="138" height="215" /></p>
<p class="ql-align-center">Do you desire a more joy-filled, deeply-enduring sense of accomplishment and success? Live your business the way you want to live with the BUSINESS BEATITUDES&#8230;The Bridge connecting sacrifice to success. <strong>YOU NEED THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><strong>TAP INTO YOUR INDUSTRIAL SOUL, RESERVE YOUR COPY NOW! BE BOLD. BE BRAVE. DARE GREATLY AND CHANGE THE WORLD. GET THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><a href="https://industrialtalk.com/business-beatitude-reserve/" target="_blank" rel="noopener"> Reserve My Copy and My 25% Discount</a></p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/milouni-sheth-and-jeff-foley-with-siemens/">Milouni Sheth and Jeff Foley with Siemens</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://industrialtalk.com/episodes/milouni-sheth-and-jeff-foley-with-siemens/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://podcasts.captivate.fm/media/10d60dcb-d387-41f8-8ab1-6b2d129a5083/Jeff-Foley-and-Milouni-Sheth-Siemens-Mp3.mp3" length="35014895" type="audio/mpeg" />

			</item>
		<item>
		<title>Ariadna Broquetas and Toni Serrano with Seven Sector Technologies</title>
		<link>https://industrialtalk.com/episodes/ariadna-broquetas-toni-serrano-sevensector/</link>
					<comments>https://industrialtalk.com/episodes/ariadna-broquetas-toni-serrano-sevensector/#respond</comments>
		
		<dc:creator><![CDATA[Scott MacKenzie]]></dc:creator>
		<pubDate>Fri, 21 Feb 2025 15:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://industrialtalk.com/captivate-podcast/ariadna-broquetas-toni-serrano-sevensectortechnologies/</guid>

					<description><![CDATA[<p>Industrial Talk is onsite at IoT Solutions World Congress and talking to Ariadna Broquetas and Toni Serrano with Seven Sector Technologies about "Making cybersecurity work for you".</p>
<p>Scott MacKenzie hosts the Industrial Talk podcast, featuring Toni and Addie from Seven Sector Technologies at the IoT Solutions World Congress in Barcelona. Toni, a cybersecurity expert, and Addie, a marketing professional, discuss their product, XDR net, which provides active defense against cyberattacks. XDR net is a hardware device that monitors and blocks potential threats on local networks. It can handle up to 500 devices per unit and is easy to set up. They also mention the implementation of digital twins to enhance security. Toni and Addie emphasize the importance of cybersecurity in today's digital landscape and invite listeners to connect with them on LinkedIn for more information.</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/ariadna-broquetas-toni-serrano-sevensector/">Ariadna Broquetas and Toni Serrano with Seven Sector Technologies</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="cfm-player-iframe" style="width: 100%; height: 170px; margin-bottom: 20px; border-radius: 10px; overflow:hidden; border: 1px solid #d6d6d6;"><iframe style="width: 100%; height: 170px;" frameborder="no" scrolling="no" seamless allow="autoplay" src="https://player.captivate.fm/aa330f95-bfee-4593-aae9-f76a5cec03a7"></iframe></div><p><strong><em>Industrial Talk </em></strong>is onsite at <a href="https://www.iotsworldcongress.com/" target="_blank" rel="noopener">IoT Solutions World Congress</a> and talking to <strong>Ariadna Broquetas and Toni Serrano with Seven Sector Technologies </strong>about &#8220;Making cybersecurity work for you&#8221;<strong>.</strong></p>
<div>
<div>
<p>Scott MacKenzie hosts the Industrial Talk podcast, featuring Toni and Addie from Seven Sector Technologies at the IoT Solutions World Congress in Barcelona. Toni, a cybersecurity expert, and Addie, a marketing professional, discuss their product, XDR net, which provides active defense against cyberattacks. XDR net is a hardware device that monitors and blocks potential threats on local networks. It can handle up to 500 devices per unit and is easy to set up. They also mention the implementation of digital twins to enhance security. Toni and Addie emphasize the importance of cybersecurity in today's digital landscape and invite listeners to connect with them on LinkedIn for more information.</p>
<h2>Action Items</h2>
<ul>
<li>[ ] Implement digital twin technology for the XDRnet product.</li>
<li>[ ] Integrate alert capabilities to notify customers of potential threats via email, phone, or other channels.</li>
<li>[ ] Reach out to Toni Serrano (LinkedIn: Toni Serrano) or Ariadna Broquetas (LinkedIn: Ariadna Broquetas) from Seven Sector Technology to discuss the XDRnet solution further.</li>
</ul>
<h2>Outline</h2>
<h3>Introduction to the Podcast and Event</h3>
<ul>
<li>Scott MacKenzie introduces the podcast, emphasizing its focus on industry professionals and innovations.</li>
<li>The podcast is recorded on-site at the IoT Solutions World Congress in Barcelona, Spain.</li>
<li>Scott highlights the event as a must-attend for problem solvers in digital transformation.</li>
<li>The company featured in the episode is Seven Sector Technologies.</li>
</ul>
<h3>Meeting the Guests: Toni and Addie</h3>
<ul>
<li>Scott introduces Toni and Addie, the guests from Seven Sector Technologies.</li>
<li>Toni and Addie are both from Barcelona, and Scott shares a humorous story about his arrival in Barcelona on a holiday.</li>
<li>The conference is in its first day, and Scott and the guests discuss the event's attendance and traffic.</li>
<li>Scott transitions to discussing the main topic: Seven Sector Technologies and their product, XDR net.</li>
</ul>
<h3>Background of Tony and Addie</h3>
<ul>
<li>Toni shares his background in cybersecurity, having studied and worked in the field since childhood.</li>
<li>Addie is a student studying international business and marketing, and she is responsible for marketing at Seven Sector Technologies.</li>
<li>Both Toni and Addie express their belief in the importance of cybersecurity in today's digital world.</li>
<li>Scott and the guests discuss the increasing threats and the necessity of cybersecurity for all enterprises.</li>
</ul>
<h3>Introduction to XDR Net and Active Defense</h3>
<ul>
<li>Toni explains XDR net, a hardware device that detects, monitors, and blocks potential attacks on local networks.</li>
<li>The device is designed to protect against various types of attacks, including those that target vulnerable parts of a network.</li>
<li>Scott inquires about the ease of setting up XDR net, and Toni assures that it is straightforward.</li>
<li>Addie adds that once the device is plugged into the network, their team takes care of the rest, ensuring minimal effort from the client.</li>
</ul>
<h3>Use Cases and Scalability</h3>
<ul>
<li>Scott uses a manufacturing scenario to illustrate how XDR net can protect a company with numerous devices.</li>
<li>Toni and Addie confirm that XDR net can handle a large number of devices, with the need for additional devices as the number of assets increases.</li>
<li>Scott asks about the scalability of the solution, and Toni and Addie assure that it can protect thousands of devices.</li>
<li>The guests emphasize the importance of active defense, which involves alerting and isolating devices under attack.</li>
</ul>
<h3>Active Defense and Threat Monitoring</h3>
<ul>
<li>Toni elaborates on active defense, explaining how XDR net can alert and block attacks in real-time.</li>
<li>Addie adds that their system also searches for potential threats and alerts clients before an attack occurs.</li>
<li>Scott inquires about how Seven Sector Technologies stays updated with new threats and protects their clients.</li>
<li>Toni explains that their system monitors the actions of attacks, not just the types, and they are working on implementing deception technology and digital twins to enhance their capabilities.</li>
</ul>
<h3>Implementation of Digital Twins</h3>
<ul>
<li>Toni and Addie discuss the development and implementation of digital twins to create a fake environment that wastes attackers' time.</li>
<li>They assure that alerts from their system are always real and not false positives.</li>
<li>Scott asks about the timeline for implementing digital twins, and Toni estimates it will be within a few months.</li>
<li>The guests emphasize the importance of making their solutions easy to implement and manage for clients.</li>
</ul>
<h3>Conclusion and Contact Information</h3>
<ul>
<li>Scott praises Toni and Addie for their expertise and the potential of their solution.</li>
<li>Toni provides his LinkedIn profile for listeners who want to connect with him.</li>
<li>Scott wraps up the episode, encouraging listeners to reach out to Toni and Addie for more information about XDR net and Seven Sector Technologies.</li>
<li>The podcast concludes with Scott emphasizing the importance of cybersecurity and the benefits of the solution discussed.</li>
</ul>
</div>
</div>
<div>
<p>Finally, get your exclusive free access to the <a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener">Industrial Academy</a> and a series on “<a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener"><strong>Why You Need To Podcast</strong></a>” for Greater Success in 2023. All links designed for keeping you current in this rapidly changing Industrial Market. Learn! Grow! Enjoy!</p>
</div>
<h2>ARIADNA BROQUETAS' CONTACT INFORMATION:</h2>
<p><strong>Personal LinkedIn: </strong><a href="https://www.linkedin.com/in/ariadnabroquetas/" target="_blank" rel="noopener">https://www.linkedin.com/in/ariadnabroquetas/</a></p>
<p><strong>Company LinkedIn: </strong><a href="https://www.linkedin.com/company/seven-sector-technologies/" target="_blank" rel="noopener">https://www.linkedin.com/company/seven-sector-technologies/</a></p>
<p><strong>Company Website:</strong> <a href="https://www.sevensector.com/" target="_blank" rel="noopener">https://www.sevensector.com/</a></p>
<h2>TONY SERRANO'S CONTACT INFORMATION:</h2>
<p><strong>Personal LinkedIn: </strong><a href="https://www.linkedin.com/in/toni-serrano-488005257/" target="_blank" rel="noopener">https://www.linkedin.com/in/toni-serrano-488005257/</a></p>
<h2>PODCAST VIDEO:</h2>
<p><iframe loading="lazy" title="Seven Sector Technology" width="500" height="281" src="https://www.youtube.com/embed/Bp5M9hJPXTs?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>THE STRATEGIC REASON &#8220;WHY YOU NEED TO PODCAST&#8221;:</h2>
<p><a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-content/uploads/2020/02/Why-you-need-to-Podcast-Graphic-2.png" width="1024" height="538" /></a></p>
<h2>OTHER GREAT INDUSTRIAL RESOURCES:</h2>
<p><strong>NEOM</strong>: <a href="https://www.neom.com/en-us" target="_blank" rel="noopener">https://www.neom.com/en-us</a></p>
<p><strong>Hexagon:</strong> <a href="https://hexagon.com/" target="_blank" rel="noopener">https://hexagon.com/</a></p>
<p><strong>Arduino:</strong> <a href="https://www.arduino.cc/" target="_blank" rel="noopener">https://www.arduino.cc/</a></p>
<p><strong>Fictiv:</strong> <a href="https://www.fictiv.com/" target="_blank" rel="noopener">https://www.fictiv.com/</a></p>
<p><strong>Hitachi Vantara:</strong> <a href="https://www.hitachivantara.com/en-us/home.html" target="_blank" rel="noopener">https://www.hitachivantara.com/en-us/home.html</a></p>
<p><strong>Industrial Marketing Solutions:</strong>  <a href="https://industrialtalk.com/industrial-marketing/" target="_blank" rel="noopener">https://industrialtalk.com/industrial-marketing/</a></p>
<p><strong>Industrial Academy:</strong> <a href="https://industrialtalk.com/industrial-academy/" target="_blank" rel="noopener">https://industrialtalk.com/industrial-academy/</a></p>
<p><strong>Industrial Dojo:</strong> <a href="https://industrialtalk.com/industrial_dojo/" target="_blank" rel="noopener">https://industrialtalk.com/industrial_dojo/</a></p>
<p><strong>We the 15:</strong><a href="https://www.wethe15.org/" target="_blank" rel="noopener"> https://www.wethe15.org/</a></p>
<h2>YOUR INDUSTRIAL DIGITAL TOOLBOX:</h2>
<p><strong>LifterLMS:</strong> Get One Month Free for $1 – <a href="https://lifterlms.com/" target="_blank" rel="noopener">https://lifterlms.com/</a></p>
<p><strong>Active Campaign:</strong> <a href="https://www.activecampaign.com/?_r=H855VEPU" target="_blank" rel="noopener">Active Campaign Link</a></p>
<p><strong>Social Jukebox:</strong> <a href="https://www.socialjukebox.com/" target="_blank" rel="noopener">https://www.socialjukebox.com/</a></p>
<h2>Industrial Academy (One Month Free Access And One Free License For Future Industrial Leader):</h2>
<p><a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-admin/wp-content/uploads/2019/10/Industrial-Academy-Graphic.png" width="1024" height="538" /></a></p>
<h2>Business Beatitude the Book</h2>
<p><img loading="lazy" decoding="async" class="alignleft" src="https://industrialtalk.com/wp-content/uploads/2019/10/BB-Book-Cover.png" width="138" height="215" /></p>
<p class="ql-align-center">Do you desire a more joy-filled, deeply-enduring sense of accomplishment and success? Live your business the way you want to live with the BUSINESS BEATITUDES&#8230;The Bridge connecting sacrifice to success. <strong>YOU NEED THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><strong>TAP INTO YOUR INDUSTRIAL SOUL, RESERVE YOUR COPY NOW! BE BOLD. BE BRAVE. DARE GREATLY AND CHANGE THE WORLD. GET THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><a href="https://industrialtalk.com/business-beatitude-reserve/" target="_blank" rel="noopener"> Reserve My Copy and My 25% Discount</a></p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/ariadna-broquetas-toni-serrano-sevensector/">Ariadna Broquetas and Toni Serrano with Seven Sector Technologies</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://industrialtalk.com/episodes/ariadna-broquetas-toni-serrano-sevensector/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://podcasts.captivate.fm/media/5cfda9c1-d78d-4a09-9234-e16100c53be3/Seven-Sector-Technology-Mp3.mp3" length="28014767" type="audio/mpeg" />

			</item>
		<item>
		<title>Laia Garcia Padro with Ackcent Cybersecurity</title>
		<link>https://industrialtalk.com/episodes/laia-garcia-padro-with-ackcent-cybersecurity/</link>
					<comments>https://industrialtalk.com/episodes/laia-garcia-padro-with-ackcent-cybersecurity/#respond</comments>
		
		<dc:creator><![CDATA[Scott MacKenzie]]></dc:creator>
		<pubDate>Fri, 15 Nov 2024 15:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://industrialtalk.com/captivate-podcast/laia-garcia-padro-with-ackcent-cybersecurity/</guid>

					<description><![CDATA[<p>Industrial Talk is onsite at IoT Solutions World Congress and talking to Laia Garcia Padro, Security Awareness Manager at Ackcent Cybersecurity about "The human solution to cybersecurity".</p>
<p>Scott MacKenzie announces a webinar on adapting to new China tariffs in manufacturing, featuring Eric Millinger and Jorge Filio. The podcast, hosted by Scott, features Laia Garcia Padro with Ackcent discussing cybersecurity, emphasizing the human element in security. Laia, from Barcelona, explains that 90% of cyber incidents involve human error, advocating for early security integration and continuous education. She highlights the importance of unique passwords, password managers, and a security-conscious culture within organizations. Laia also mentions Ackcent's services, including auditing, monitoring, and response teams, and stresses the need for readiness against evolving cyber threats.</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/laia-garcia-padro-with-ackcent-cybersecurity/">Laia Garcia Padro with Ackcent Cybersecurity</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="cfm-player-iframe" style="width: 100%; height: 170px; margin-bottom: 20px; border-radius: 10px; overflow:hidden; border: 1px solid #d6d6d6;"><iframe style="width: 100%; height: 170px;" frameborder="no" scrolling="no" seamless allow="autoplay" src="https://player.captivate.fm/b7cd538d-f250-4182-9c9a-e6f79867f323"></iframe></div><p><strong><em>Industrial Talk </em></strong>is onsite at <a href="https://www.iotsworldcongress.com/" target="_blank" rel="noopener">IoT Solutions World Congress</a> and talking to <strong>Laia Garcia Padro, Security Awareness Manager at Ackcent Cybersecurity </strong>about &#8220;The human solution to cybersecurity&#8221;<strong>.</strong></p>
<div>
<p>Scott MacKenzie announces a webinar on adapting to new China tariffs in manufacturing, featuring Eric Millinger and Jorge Filio. The podcast, hosted by Scott, features Laia Garcia Padro with Ackcent discussing cybersecurity, emphasizing the human element in security. Laia, from Barcelona, explains that 90% of cyber incidents involve human error, advocating for early security integration and continuous education. She highlights the importance of unique passwords, password managers, and a security-conscious culture within organizations. Laia also mentions Ackcent's services, including auditing, monitoring, and response teams, and stresses the need for readiness against evolving cyber threats.</p>
<h2>Action Items</h2>
<ul>
<li>[ ] Promote the webinar and encourage attendance.</li>
<li>[ ] Provide tips on things to do and places to go in Barcelona.</li>
<li>[ ] Connect with Laia Garcia Padro on LinkedIn to learn more about the human aspect of cyber security.</li>
</ul>
<h2>Outline</h2>
<h3>Webinar Announcement and Introduction</h3>
<ul>
<li>Scott MacKenzie announces a webinar titled &#8220;Post Election Manufacturing Adapting to New China Tariffs in 2025&#8221; featuring Eric Millinger and Jorge Filio.</li>
<li>The webinar will focus on metal casting and fabrication, scheduled for Wednesday, November 20, from 12 to 1 PM Eastern Standard Time.</li>
<li>Scott emphasizes the importance of educating, collaborating, and innovating within the manufacturing market.</li>
<li>The webinar will be available on demand for those who cannot attend live, highlighting the support from Redstone Manufacturing.</li>
</ul>
<h3>Introduction to Industrial Talk Podcast</h3>
<ul>
<li>Speaker 2 introduces Scott MacKenzie as a passionate industry professional dedicated to sharing innovations and trends in manufacturing.</li>
<li>Scott thanks the listeners for their support and celebrates industrial professionals for their boldness, bravery, and problem-solving skills.</li>
<li>The podcast is broadcasting from IoT Solutions World Congress in Barcelona, Spain, focusing on cybersecurity.</li>
<li>Scott introduces Laia Garcia Padro with Ackcent, the guest for the episode, and mentions her local connection to Barcelona.</li>
</ul>
<h3>Laia Ackcent's Background and Role</h3>
<ul>
<li>Laia shares her background, including her education in law, management, and psychology, and her career shift into cybersecurity.</li>
<li>She explains her current role in securing the human part of cybersecurity, emphasizing the importance of understanding risks and changing behaviors.</li>
<li>Scott and Laia discuss the human component in technology and its significance in the manufacturing industry.</li>
<li>Laia mentions that her company, Ackcent, is celebrating its 10th anniversary and she has been with the company for eight years.</li>
</ul>
<h3>The Human Component in Cybersecurity</h3>
<ul>
<li>Scott and Laia discuss the reluctance of manufacturers to address cybersecurity concerns, focusing on the human aspect.</li>
<li>Laia explains that early integration of security measures is crucial to avoid complications later on.</li>
<li>They talk about the common misconception that cybersecurity is an obstacle rather than a necessary precaution.</li>
<li>Laia highlights the importance of being aware of the risks and partnering with experts to stay updated on evolving threats.</li>
</ul>
<h3>Educating and Training Employees</h3>
<ul>
<li>Laia emphasizes the need for continuous education and awareness among employees to prevent cybersecurity incidents.</li>
<li>She discusses the challenges of changing habits, such as reusing passwords, and the importance of using tools like password managers.</li>
<li>Scott and Laia talk about the role of new hires in maintaining security culture and the importance of starting from the basics.</li>
<li>Laia stresses the importance of creating a culture where employees feel responsible and comfortable reporting security issues.</li>
</ul>
<h3>Handling Cybersecurity Incidents</h3>
<ul>
<li>Laia explains Ackcent's approach to handling cybersecurity incidents, including auditing environments for vulnerabilities and monitoring for threats.</li>
<li>She describes the role of the blue team in responding to alarms and addressing potential threats.</li>
<li>Scott and Laia discuss the importance of collaboration within the cybersecurity industry to share knowledge and address new threats.</li>
<li>Laia highlights the evolving nature of cybercrime and the need for organizations to stay vigilant and prepared.</li>
</ul>
<h3>The Role of Trusted Individuals in Cybersecurity</h3>
<ul>
<li>Scott and Laia discuss the importance of finding trusted individuals to help with cybersecurity efforts.</li>
<li>Laia mentions that Ackcent provides various services beyond her role, including auditing and monitoring.</li>
<li>They talk about the importance of having a baseline of security measures to reduce the risk of cyberattacks.</li>
<li>Laia emphasizes the need for organizations to be ready for when, not if, a cybersecurity incident occurs.</li>
</ul>
<h3>Conclusion and Contact Information</h3>
<ul>
<li>Scott wraps up the conversation by emphasizing the importance of having cybersecurity conversations and addressing the human component.</li>
<li>Laia provides her contact information and encourages listeners to reach out for more information.</li>
<li>Scott thanks Laia for her insights and encourages listeners to stay connected and informed about cybersecurity.</li>
<li>The podcast concludes with a reminder to be brave and innovative in addressing cybersecurity challenges.</li>
</ul>
</div>
<p>Finally, get your exclusive free access to the <a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener">Industrial Academy</a> and a series on “<a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener"><strong>Why You Need To Podcast</strong></a>” for Greater Success in 2023. All links designed for keeping you current in this rapidly changing Industrial Market. Learn! Grow! Enjoy!</p>
<h2>LAIA GARCIA PADRO'S CONTACT INFORMATION:</h2>
<p><strong>Personal LinkedIn: </strong><a href="https://www.linkedin.com/in/laia-garcia-padró-870790158/" target="_blank" rel="noopener">https://www.linkedin.com/in/laia-garcia-padró-870790158/</a></p>
<p><strong>Company LinkedIn: </strong><a href="https://www.linkedin.com/company/ackcent/" target="_blank" rel="noopener">https://www.linkedin.com/company/ackcent/</a></p>
<p><strong>Company Website:</strong> <a href="https://ackcent.com/" target="_blank" rel="noopener">https://ackcent.com/</a></p>
<h2>PODCAST VIDEO:</h2>
<p><iframe loading="lazy" title="Laia Garcia Padro | Ackcent | The human solution to cybersecurity" width="500" height="281" src="https://www.youtube.com/embed/1WVG7gUJ3Xc?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>THE STRATEGIC REASON &#8220;WHY YOU NEED TO PODCAST&#8221;:</h2>
<p><a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-content/uploads/2020/02/Why-you-need-to-Podcast-Graphic-2.png" width="1024" height="538" /></a></p>
<h2>OTHER GREAT INDUSTRIAL RESOURCES:</h2>
<p><strong>NEOM</strong>: <a href="https://www.neom.com/en-us" target="_blank" rel="noopener">https://www.neom.com/en-us</a></p>
<p><strong>Hexagon:</strong> <a href="https://hexagon.com/" target="_blank" rel="noopener">https://hexagon.com/</a></p>
<p><strong>Arduino:</strong> <a href="https://www.arduino.cc/" target="_blank" rel="noopener">https://www.arduino.cc/</a></p>
<p><strong>Fictiv:</strong> <a href="https://www.fictiv.com/" target="_blank" rel="noopener">https://www.fictiv.com/</a></p>
<p><strong>Hitachi Vantara:</strong> <a href="https://www.hitachivantara.com/en-us/home.html" target="_blank" rel="noopener">https://www.hitachivantara.com/en-us/home.html</a></p>
<p><strong>Industrial Marketing Solutions:</strong>  <a href="https://industrialtalk.com/industrial-marketing/" target="_blank" rel="noopener">https://industrialtalk.com/industrial-marketing/</a></p>
<p><strong>Industrial Academy:</strong> <a href="https://industrialtalk.com/industrial-academy/" target="_blank" rel="noopener">https://industrialtalk.com/industrial-academy/</a></p>
<p><strong>Industrial Dojo:</strong> <a href="https://industrialtalk.com/industrial_dojo/" target="_blank" rel="noopener">https://industrialtalk.com/industrial_dojo/</a></p>
<p><strong>We the 15:</strong><a href="https://www.wethe15.org/" target="_blank" rel="noopener"> https://www.wethe15.org/</a></p>
<h2>YOUR INDUSTRIAL DIGITAL TOOLBOX:</h2>
<p><strong>LifterLMS:</strong> Get One Month Free for $1 – <a href="https://lifterlms.com/" target="_blank" rel="noopener">https://lifterlms.com/</a></p>
<p><strong>Active Campaign:</strong> <a href="https://www.activecampaign.com/?_r=H855VEPU" target="_blank" rel="noopener">Active Campaign Link</a></p>
<p><strong>Social Jukebox:</strong> <a href="https://www.socialjukebox.com/" target="_blank" rel="noopener">https://www.socialjukebox.com/</a></p>
<h2>Industrial Academy (One Month Free Access And One Free License For Future Industrial Leader):</h2>
<p><a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-admin/wp-content/uploads/2019/10/Industrial-Academy-Graphic.png" width="1024" height="538" /></a></p>
<h2>Business Beatitude the Book</h2>
<p><img loading="lazy" decoding="async" class="alignleft" src="https://industrialtalk.com/wp-content/uploads/2019/10/BB-Book-Cover.png" width="138" height="215" /></p>
<p class="ql-align-center">Do you desire a more joy-filled, deeply-enduring sense of accomplishment and success? Live your business the way you want to live with the BUSINESS BEATITUDES&#8230;The Bridge connecting sacrifice to success. <strong>YOU NEED THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><strong>TAP INTO YOUR INDUSTRIAL SOUL, RESERVE YOUR COPY NOW! BE BOLD. BE BRAVE. DARE GREATLY AND CHANGE THE WORLD. GET THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><a href="https://industrialtalk.com/business-beatitude-reserve/" target="_blank" rel="noopener"> Reserve My Copy and My 25% Discount</a></p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/laia-garcia-padro-with-ackcent-cybersecurity/">Laia Garcia Padro with Ackcent Cybersecurity</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://industrialtalk.com/episodes/laia-garcia-padro-with-ackcent-cybersecurity/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://podcasts.captivate.fm/media/06743c6b-13e5-4db5-8802-2235d939ad94/Laia-Ackcent-Mp3.mp3" length="33274799" type="audio/mpeg" />

			</item>
		<item>
		<title>Giuseppe Serio with Upstream Security</title>
		<link>https://industrialtalk.com/episodes/giuseppe-serio-with-upstream-security/</link>
					<comments>https://industrialtalk.com/episodes/giuseppe-serio-with-upstream-security/#respond</comments>
		
		<dc:creator><![CDATA[Scott MacKenzie]]></dc:creator>
		<pubDate>Mon, 30 Sep 2024 15:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://industrialtalk.com/captivate-podcast/giuseppe-serio-with-upstream-security</guid>

					<description><![CDATA[<p>Industrial Talk is onsite at IoT Solutions World Congress and talking to Giuseppe Serio, Vice President at Upstream Security about "Active cybersecurity visibility into your connected assets!".</p>
<p>Scott MacKenzie and Giuseppe from Upstream Security discussed the critical importance of cybersecurity in the rapidly evolving field of autonomous vehicles. Giuseppe highlighted that modern vehicles, with up to 100 million lines of code, are incredibly complex and vulnerable to cyber attacks. He emphasized the need for proactive measures, such as secure-by-design principles, continuous monitoring, and resilient systems. Giuseppe also stressed the importance of education and awareness among consumers and professionals. The conversation underscored the necessity of integrating cybersecurity from the outset of connected technologies to ensure safety and security.</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/giuseppe-serio-with-upstream-security/">Giuseppe Serio with Upstream Security</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="cfm-player-iframe" style="width: 100%; height: 170px; margin-bottom: 20px; border-radius: 10px; overflow:hidden; border: 1px solid #d6d6d6;"><iframe style="width: 100%; height: 170px;" frameborder="no" scrolling="no" seamless allow="autoplay" src="https://player.captivate.fm/f5c7e97d-fc23-43f7-8a3d-76e1788ada6c"></iframe></div><p><strong><em>Industrial Talk </em></strong>is onsite at <a href="https://www.iotsworldcongress.com/" target="_blank" rel="noopener">IoT Solutions World Congress</a> and talking to <strong>Giuseppe Serio, Vice President at Upstream Security </strong>about &#8220;Active cybersecurity visibility into your connected assets!&#8221;<strong>.</strong></p>
<div>
<p>Scott MacKenzie and Giuseppe from Upstream Security discussed the critical importance of cybersecurity in the rapidly evolving field of autonomous vehicles. Giuseppe highlighted that modern vehicles, with up to 100 million lines of code, are incredibly complex and vulnerable to cyber attacks. He emphasized the need for proactive measures, such as secure-by-design principles, continuous monitoring, and resilient systems. Giuseppe also stressed the importance of education and awareness among consumers and professionals. The conversation underscored the necessity of integrating cybersecurity from the outset of connected technologies to ensure safety and security.</p>
<h2>Action Items</h2>
<ul>
<li>[ ] Connect with Giuseppe Serio on LinkedIn to further discuss cybersecurity in the automotive and IoT industries.</li>
<li>[ ] Explore the services and solutions offered by Upstream.auto to address cybersecurity challenges.</li>
</ul>
<h2>Outline</h2>
<h3>Welcome and Introduction to Industrial Talk Podcast</h3>
<ul>
<li>Scott MacKenzie and the Industrial Talk Podcast, emphasizing its focus on industry professionals and innovations.</li>
<li>Scott MacKenzie thanks listeners and highlights the importance of industrial professionals in solving global problems.</li>
<li>The podcast is being recorded at the IoT Solutions World Congress in Barcelona, Spain, with a strong recommendation for attendees to mark their calendars for the next event.</li>
<li>Scott MacKenzie introduces Giuseppe from Upstream Security, focusing on cybersecurity in the automotive industry.</li>
</ul>
<h3>Giuseppe's Background and Role in Cybersecurity</h3>
<ul>
<li>Giuseppe introduces himself, mentioning his work with Upstream Security in Frankfurt, Germany, and their focus on making mobility safe and secure.</li>
<li>Giuseppe explains his 20-year background in the automotive industry, including roles at IBM and consulting.</li>
<li>The conversation shifts to the complexity of modern vehicles, with up to 100 million lines of code, compared to the 2 million lines in an F-15 fighter jet.</li>
<li>Giuseppe emphasizes the importance of cybersecurity in the context of autonomous vehicles, given their increasing complexity and potential vulnerabilities.</li>
</ul>
<h3>The Necessity of Cybersecurity in Autonomous Vehicles</h3>
<ul>
<li>Scott MacKenzie and Giuseppe discuss the sophistication of autonomous vehicles and the need for robust cybersecurity measures.</li>
<li>Giuseppe highlights the potential risks associated with cyber attacks on autonomous vehicles, including the possibility of causing widespread congestion or harm.</li>
<li>The conversation touches on the importance of continuous monitoring and understanding of cyber threats to ensure vehicle safety.</li>
<li>Giuseppe mentions the regulatory changes in 2022 and 2024, requiring compliance and risk management in the automotive industry.</li>
</ul>
<h3>Approaches to Cybersecurity in the Automotive Industry</h3>
<ul>
<li>Giuseppe outlines the steps for building resiliency against cyber attacks, including raising the bar, building secure by design, and constant monitoring.</li>
<li>The discussion includes the importance of understanding and addressing anomalies, as sophisticated cyber attacks can be difficult to distinguish from normal vehicle behavior.</li>
<li>Giuseppe provides examples of how cyber attacks can manifest in real-world scenarios, such as remote car control and the potential for misuse.</li>
<li>The conversation emphasizes the need for a proactive approach to cybersecurity, with regular training and preparedness for potential attacks.</li>
</ul>
<h3>The Role of Digital Twins in Cybersecurity</h3>
<ul>
<li>Scott MacKenzie and Giuseppe discuss the use of digital twins to simulate and test potential cyber attacks on autonomous vehicles.</li>
<li>Giuseppe explains how Upstream Security provides stateful digital twins to understand vehicle behavior and perform forensic investigations.</li>
<li>The conversation highlights the importance of fixing the root cause of problems rather than just addressing symptoms.</li>
<li>Giuseppe shares an example of how safety and security measures in vehicles can have unintended cybersecurity implications, such as the consolidation of functions in the head unit.</li>
</ul>
<h3>The Importance of Cybersecurity in Connected Assets</h3>
<ul>
<li>Scott MacKenzie and Giuseppe agree that cybersecurity must be a priority from the design phase of connected assets, not an afterthought.</li>
<li>The conversation emphasizes the interconnectedness of cybersecurity and digital connectivity, with cybersecurity being essential for successful IoT implementation.</li>
<li>Giuseppe compares the current state of cybersecurity in the automotive industry to the early days of space exploration, acknowledging the challenges and the need for continuous improvement.</li>
<li>The discussion concludes with a call to awareness and preparedness for cybersecurity risks, encouraging listeners to stay informed and proactive.</li>
</ul>
<h3>Closing Remarks and Contact Information</h3>
<ul>
<li>Scott MacKenzie thanks Giuseppe for the insightful conversation and provides contact information for listeners to connect with him.</li>
<li>The podcast reiterates the importance of cybersecurity in the context of connected assets and encourages listeners to reach out to Giuseppe for further discussions.</li>
<li>Scott MacKenzie promotes the IoT Solutions World Congress as a must-attend event for industry professionals.</li>
<li>The podcast wraps up with a reminder to stay tuned for future conversations and to continue supporting the Industrial Talk Podcast.</li>
</ul>
</div>
<p>Finally, get your exclusive free access to the <a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener">Industrial Academy</a> and a series on “<a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener"><strong>Why You Need To Podcast</strong></a>” for Greater Success in 2023. All links designed for keeping you current in this rapidly changing Industrial Market. Learn! Grow! Enjoy!</p>
<h2>GIUSEPPE SERIO'S CONTACT INFORMATION:</h2>
<p><strong>Personal LinkedIn: </strong><a href="https://www.linkedin.com/in/giuseppe-serio/" target="_blank" rel="noopener">https://www.linkedin.com/in/giuseppe-serio/</a></p>
<p><strong>Company LinkedIn: </strong><a href="https://www.linkedin.com/company/upstream-security/" target="_blank" rel="noopener">https://www.linkedin.com/company/upstream-security/</a></p>
<p><strong>Company Website:</strong> <a href="https://upstream.auto/" target="_blank" rel="noopener">https://upstream.auto/</a></p>
<h2>PODCAST VIDEO:</h2>
<p><iframe loading="lazy" title="Giuseppe Serio | Upstream Security | IoTSWC | Cybersecurity visibility into your connected assets" width="500" height="281" src="https://www.youtube.com/embed/yj0yLdHs4c0?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>THE STRATEGIC REASON &#8220;WHY YOU NEED TO PODCAST&#8221;:</h2>
<p><a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-content/uploads/2020/02/Why-you-need-to-Podcast-Graphic-2.png" width="1024" height="538" /></a></p>
<h2>OTHER GREAT INDUSTRIAL RESOURCES:</h2>
<p><strong>NEOM</strong>: <a href="https://www.neom.com/en-us" target="_blank" rel="noopener">https://www.neom.com/en-us</a></p>
<p><strong>Hexagon:</strong> <a href="https://hexagon.com/" target="_blank" rel="noopener">https://hexagon.com/</a></p>
<p><strong>Arduino:</strong> <a href="https://www.arduino.cc/" target="_blank" rel="noopener">https://www.arduino.cc/</a></p>
<p><strong>Fictiv:</strong> <a href="https://www.fictiv.com/" target="_blank" rel="noopener">https://www.fictiv.com/</a></p>
<p><strong>Hitachi Vantara:</strong> <a href="https://www.hitachivantara.com/en-us/home.html" target="_blank" rel="noopener">https://www.hitachivantara.com/en-us/home.html</a></p>
<p><strong>Industrial Marketing Solutions:</strong>  <a href="https://industrialtalk.com/industrial-marketing/" target="_blank" rel="noopener">https://industrialtalk.com/industrial-marketing/</a></p>
<p><strong>Industrial Academy:</strong> <a href="https://industrialtalk.com/industrial-academy/" target="_blank" rel="noopener">https://industrialtalk.com/industrial-academy/</a></p>
<p><strong>Industrial Dojo:</strong> <a href="https://industrialtalk.com/industrial_dojo/" target="_blank" rel="noopener">https://industrialtalk.com/industrial_dojo/</a></p>
<p><strong>We the 15:</strong><a href="https://www.wethe15.org/" target="_blank" rel="noopener"> https://www.wethe15.org/</a></p>
<h2>YOUR INDUSTRIAL DIGITAL TOOLBOX:</h2>
<p><strong>LifterLMS:</strong> Get One Month Free for $1 – <a href="https://lifterlms.com/" target="_blank" rel="noopener">https://lifterlms.com/</a></p>
<p><strong>Active Campaign:</strong> <a href="https://www.activecampaign.com/?_r=H855VEPU" target="_blank" rel="noopener">Active Campaign Link</a></p>
<p><strong>Social Jukebox:</strong> <a href="https://www.socialjukebox.com/" target="_blank" rel="noopener">https://www.socialjukebox.com/</a></p>
<h2>Industrial Academy (One Month Free Access And One Free License For Future Industrial Leader):</h2>
<p><a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-admin/wp-content/uploads/2019/10/Industrial-Academy-Graphic.png" width="1024" height="538" /></a></p>
<h2>Business Beatitude the Book</h2>
<p><img loading="lazy" decoding="async" class="alignleft" src="https://industrialtalk.com/wp-content/uploads/2019/10/BB-Book-Cover.png" width="138" height="215" /></p>
<p class="ql-align-center">Do you desire a more joy-filled, deeply-enduring sense of accomplishment and success? Live your business the way you want to live with the BUSINESS BEATITUDES&#8230;The Bridge connecting sacrifice to success. <strong>YOU NEED THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><strong>TAP INTO YOUR INDUSTRIAL SOUL, RESERVE YOUR COPY NOW! BE BOLD. BE BRAVE. DARE GREATLY AND CHANGE THE WORLD. GET THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><a href="https://industrialtalk.com/business-beatitude-reserve/" target="_blank" rel="noopener"> Reserve My Copy and My 25% Discount</a></p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/giuseppe-serio-with-upstream-security/">Giuseppe Serio with Upstream Security</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://industrialtalk.com/episodes/giuseppe-serio-with-upstream-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://podcasts.captivate.fm/media/bf71d168-7bb1-4a04-ae98-5f8fdf26094f/Giuseppe-Serio-Upstream-Mp3.mp3" length="27335087" type="audio/mpeg" />

			</item>
		<item>
		<title>Bill Johnson with TDI Technologies</title>
		<link>https://industrialtalk.com/episodes/bill-johnson-tditechnologies/</link>
					<comments>https://industrialtalk.com/episodes/bill-johnson-tditechnologies/#respond</comments>
		
		<dc:creator><![CDATA[Scott MacKenzie]]></dc:creator>
		<pubDate>Mon, 05 Aug 2024 15:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://industrialtalk.com/captivate-podcast/bill-johnson-with-tdi-technologies</guid>

					<description><![CDATA[<p>Industrial Talk is onsite at DistribuTech and talking to Bill Johnson, President and CEO of  TDi Technologies about "Protecting your connected assets with Console Works".</p>
<p>Scott MacKenzie and Bill Johnson discussed the challenges of remote access in industrial environments, particularly in terms of cybersecurity. Bill explained how his company's product, Console Works, provides secure remote access to assets while controlling who can access them. Scott emphasized the importance of separating insiders and vendors, and Bill highlighted the need to validate users and keep the platform free of viruses and malware. The speakers also discussed the importance of directly connecting to industrial control systems for security and accuracy, and the need for zero trust foundations in critical infrastructure security. They stressed the value of validating information from multiple sources to ensure accuracy and security.</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/bill-johnson-tditechnologies/">Bill Johnson with TDI Technologies</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="cfm-player-iframe" style="width: 100%; height: 170px; margin-bottom: 20px; border-radius: 10px; overflow:hidden; border: 1px solid #d6d6d6;"><iframe style="width: 100%; height: 170px;" frameborder="no" scrolling="no" seamless allow="autoplay" src="https://player.captivate.fm/9dd985d6-7388-4299-8a9e-77fa933cabff"></iframe></div><p><a href="https://industrialtalk.com/" target="_blank" rel="noopener"><strong><em>Industrial Talk </em></strong></a>is onsite at <a href="https://www.distributech.com/2024-event-schedule" target="_blank" rel="noopener">DistribuTech</a> and talking to <strong>Bill Johnson, President and CEO of  TDi Technologies </strong>about &#8220;Protecting your connected assets with Console Works&#8221;.</p>
<div>
<p>Scott MacKenzie and Bill Johnson discussed the challenges of remote access in industrial environments, particularly in terms of cybersecurity. Bill explained how his company's product, Console Works, provides secure remote access to assets while controlling who can access them. Scott emphasized the importance of separating insiders and vendors, and Bill highlighted the need to validate users and keep the platform free of viruses and malware. The speakers also discussed the importance of directly connecting to industrial control systems for security and accuracy, and the need for zero trust foundations in critical infrastructure security. They stressed the value of validating information from multiple sources to ensure accuracy and security.</p>
<h2>Action Items</h2>
<ul>
<li>[ ] Contact Bill Johnson or visit consoleworks.com to learn more about ConsoleWorks and how it can provide secure remote access for industrial control systems.</li>
<li>[ ] Share the Industrial Talk Podcast on other platforms to continue educating others, collaborating on innovations, and changing the world securely.</li>
<li>[ ] Consider attending Distributech next year for more conversations on connecting industrial systems securely.</li>
</ul>
<h2>Outline</h2>
<h3>Remote access security in industrial environments.</h3>
<ul>
<li>Bill Johnson, industry expert on remote access and cybersecurity, joins the show.</li>
<li>Speaker discusses TDI Technologies' unique remote access solution for industrial environments.</li>
</ul>
<h3>Remote access security and asset management.</h3>
<ul>
<li>Scott MacKenzie explains how their product validates users and controls access to assets.</li>
<li>Product acts as a &#8220;man in the middle&#8221; to ensure secure connections and logging of unencrypted traffic.</li>
<li>Bill explains how to set up the product to monitor and analyze endpoints, with onboarding assets from integrations with tools like Dragos or Nozomi.</li>
<li>Bill discusses how to provide credentials for endpoints, with options for either product ownership or business choice, and setting up taking a day's time.</li>
</ul>
<h3>Securing remote access to critical infrastructure.</h3>
<ul>
<li>Speaker explains how product simplifies network access for end users.</li>
<li>Bill emphasizes data security and automation in connected infrastructure.</li>
</ul>
<h3>Cybersecurity for critical infrastructure using data and AI.</h3>
<ul>
<li>Bill explains how their product collects device configuration settings directly from the endpoint.</li>
<li>Bill highlights the benefits of validating information from multiple sources, including devices, tools, and vendors.</li>
<li>Ralph wants Scott to use data from multiple sources to build a trusted picture of a device.</li>
<li>Bill Johnson from TDI Technologies discusses cybersecurity and remote access solutions.</li>
</ul>
</div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>If interested in being on the Industrial Talk show, simply <strong><a href="https://industrialtalk.com/contact/" target="_blank" rel="noopener">contact us</a></strong> and let's have a quick conversation.</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p>Finally, get your exclusive free access to the <a href="https://industrialtalk.com/industrial-academy/" target="_blank" rel="noopener">Industrial Academy</a> and a series on “<a href="https://industrialtalk.com/course/industrial-talk-marketing-process-course/" target="_blank" rel="noopener"><strong>Marketing Process Course</strong></a>” for Greater Success in 2024. All links designed for keeping you current in this rapidly changing Industrial Market. Learn! Grow! Enjoy!</p>
<h2>BILL JOHNSON'S CONTACT INFORMATION:</h2>
<p><strong>Personal LinkedIn: </strong><a href="https://www.linkedin.com/in/baronpilot/" target="_blank" rel="noopener">https://www.linkedin.com/in/baronpilot/</a></p>
<p><strong>Company LinkedIn:</strong> <a href="https://www.linkedin.com/company/tditechnologies/" target="_blank" rel="noopener">https://www.linkedin.com/company/tditechnologies/</a></p>
<p><strong>Company Website</strong>: <a href="https://www.tditechnologies.com/" target="_blank" rel="noopener">https://www.tditechnologies.com/</a></p>
<h2>PODCAST VIDEO:</h2>
<p><iframe loading="lazy" title="Bill Johnson | TDi Technologies | ConsoleWorks | DistribuTECH | Protecting assets with Console Works" width="500" height="281" src="https://www.youtube.com/embed/iV8CznZ5n6w?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>OTHER GREAT INDUSTRIAL RESOURCES:</h2>
<p><strong>NEOM</strong>: <a href="https://www.neom.com/en-us" target="_blank" rel="noopener">https://www.neom.com/en-us</a></p>
<p><strong>Hexagon:</strong> <a href="https://hexagon.com/" target="_blank" rel="noopener">https://hexagon.com/</a></p>
<p><strong>Palo Alto Networks:</strong> <a href="https://www.paloaltonetworks.com/ot-security-tco" target="_blank" rel="noopener">https://www.paloaltonetworks.com/ot-security-tco</a></p>
<p><strong>Palo Alto Networks Report</strong> <a href="https://start.paloaltonetworks.com/industrial-ot-security-esg-report.html?medium=social&campaign=advocacy&blaid=4580765" target="_blank" rel="noopener">HERE</a>.</p>
<p><strong>Fictiv:</strong> <a href="https://www.fictiv.com/" target="_blank" rel="noopener">https://www.fictiv.com/</a></p>
<p><strong>Hitachi Vantara:</strong> <a href="https://www.hitachivantara.com/en-us/home.html" target="_blank" rel="noopener">https://www.hitachivantara.com/en-us/home.html</a></p>
<p><strong>Industrial Marketing Solutions:</strong>  <a href="https://industrialtalk.com/industrial-marketing/" target="_blank" rel="noopener">https://industrialtalk.com/industrial-marketing/</a></p>
<p><strong>Industrial Academy:</strong> <a href="https://industrialtalk.com/industrial-academy/" target="_blank" rel="noopener">https://industrialtalk.com/industrial-academy/</a></p>
<p><strong>Industrial Dojo:</strong> <a href="https://industrialtalk.com/industrial_dojo/" target="_blank" rel="noopener">https://industrialtalk.com/industrial_dojo/</a></p>
<p><strong>We the 15:</strong><a href="https://www.wethe15.org/" target="_blank" rel="noopener"> https://www.wethe15.org/</a></p>
<h2>YOUR INDUSTRIAL DIGITAL TOOLBOX:</h2>
<p><strong>LifterLMS:</strong> Get One Month Free for $1 – <a href="https://lifterlms.com/" target="_blank" rel="noopener">https://lifterlms.com/</a></p>
<p><strong>Active Campaign:</strong> <a href="https://www.activecampaign.com/?_r=H855VEPU" target="_blank" rel="noopener">Active Campaign Link</a></p>
<p><strong>Social Jukebox:</strong> <a href="https://www.socialjukebox.com/" target="_blank" rel="noopener">https://www.socialjukebox.com/</a></p>
<h2>Industrial Academy (One Month Free Access And One Free License For Future Industrial Leader):</h2>
<p><a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-admin/wp-content/uploads/2019/10/Industrial-Academy-Graphic.png" width="1024" height="538" /></a></p>
<h2>Business Beatitude the Book</h2>
<p><img loading="lazy" decoding="async" class="alignleft" src="https://industrialtalk.com/wp-content/uploads/2019/10/BB-Book-Cover.png" width="144" height="225" /></p>
<p class="ql-align-center">Do you desire a more joy-filled, deeply-enduring sense of accomplishment and success? Live your business the way you want to live with the BUSINESS BEATITUDES&#8230;The Bridge connecting sacrifice to success. <strong>YOU NEED THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><strong>TAP INTO YOUR INDUSTRIAL SOUL, RESERVE YOUR COPY NOW! BE BOLD. BE BRAVE. DARE GREATLY AND CHANGE THE WORLD. GET THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><a href="https://industrialtalk.com/business-beatitude-reserve/" target="_blank" rel="noopener"> Reserve My Copy and My 25% Discount</a></p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/bill-johnson-tditechnologies/">Bill Johnson with TDI Technologies</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://industrialtalk.com/episodes/bill-johnson-tditechnologies/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://podcasts.captivate.fm/media/9c476c33-dc02-40f0-ba63-a0990bcdabd2/Bill-Johnson-Console-Works-Mp3.mp3" length="30039407" type="audio/mpeg" />

			</item>
		<item>
		<title>Huxley Barbee with runZero</title>
		<link>https://industrialtalk.com/episodes/huxley-barbee-runzero/</link>
					<comments>https://industrialtalk.com/episodes/huxley-barbee-runzero/#respond</comments>
		
		<dc:creator><![CDATA[Scott MacKenzie]]></dc:creator>
		<pubDate>Fri, 19 Jan 2024 15:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://industrialtalk.com/captivate-podcast/huxley-barbee-runzero</guid>

					<description><![CDATA[<p>Industrial Talk is chatting with Huxley Barbee, Security Evangelist at runZero about “OT Security vs IT Security and Passive vs Active Scanning.”</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/huxley-barbee-runzero/">Huxley Barbee with runZero</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="cfm-player-iframe" style="width: 100%; height: 170px; margin-bottom: 20px; border-radius: 10px; overflow:hidden; border: 1px solid #d6d6d6;"><iframe style="width: 100%; height: 170px;" frameborder="no" scrolling="no" seamless allow="autoplay" src="https://player.captivate.fm/ed026e0c-93b5-4eec-ba4c-7da84643dca8"></iframe></div><p><strong><em>Industrial Talk </em></strong>is chatting with <b>Huxley Barbee, Security Evangelist at runZero </b>about “OT Security vs IT Security and Passive vs Active Scanning.”  The following is a summary of our conversation:</p>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<ul>
<li><b>Cybersecurity and OT with Huxley from Run Zero.</b> <a href="https://otter.ai/u/rWovEx4R_jTrqJlTSRfLwp60E-A?tab=summary&t=0s">0:00</a>
<ul>
<li>Palo Alto Networks provides comprehensive security solutions for all assets, networks, and remote operations.</li>
<li>Huxley Barbee, security evangelist at runZero, discusses cybersecurity and the importance of staying connected and safe in the digital world.</li>
<li>Industrial Talk is a platform dedicated to amplifying voices and solving problems through various mediums, including podcasts, videos, and webcasts.</li>
</ul>
</li>
<li><b>Cybersecurity in IoT, OT, and ICS environments.</b> <a href="https://otter.ai/u/rWovEx4R_jTrqJlTSRfLwp60E-A?tab=summary&t=277s">4:36</a>
<ul>
<li>Security evangelist at Ron zero discusses chasm solution for cyber asset attack surface management.</li>
<li>Huxley highlights the importance of security in IoT and OT environments, emphasizing that it's often an afterthought.</li>
<li>Scott MacKenzie agrees, noting that security should be a priority from the beginning of a project, rather than an add-on later on.</li>
</ul>
</li>
<li><b>Industrial control systems security.</b> <a href="https://otter.ai/u/rWovEx4R_jTrqJlTSRfLwp60E-A?tab=summary&t=553s">9:13</a>
<ul>
<li>Scott MacKenzie and Huxley discuss the importance of aligning security and operations in an organization, with Huxley highlighting the need for more conversations to understand the importance of including security in planning and decision-making.</li>
<li>Huxley notes that operational teams may prioritize mechanical problems over security updates, but this can lead to negative consequences, such as security breaches or outages, which can affect the way devices operate.</li>
<li>Huxley emphasizes the importance of knowing what assets are present in an OT or ICS environment for proper security controls.</li>
</ul>
</li>
<li><b>Cybersecurity risks in industrial control systems.</b> <a href="https://otter.ai/u/rWovEx4R_jTrqJlTSRfLwp60E-A?tab=summary&t=845s">14:04</a>
<ul>
<li>Huxley emphasizes the importance of selecting security controls commensurate with the value of assets.</li>
<li>Huxley highlights the irony of introducing security measures to avoid outages, only to inadvertently cause them.</li>
<li>Vendors and devices create variety and complexity in IoT security.</li>
</ul>
</li>
<li><b>Active scanning techniques for IoT devices.</b> <a href="https://otter.ai/u/rWovEx4R_jTrqJlTSRfLwp60E-A?tab=summary&t=1202s">20:02</a>
<ul>
<li>Huxley explains how active scanning techniques can cause real-world problems, such as network outages, due to the way they are implemented.</li>
<li>The speaker highlights the bias against active scanning that has developed as a result of poor deployments in the past.</li>
<li>Huxley argues that active scanning can be safe for OT and ICS environments with proper development.</li>
</ul>
</li>
<li><b>Active vs passive device discovery in cybersecurity.</b> <a href="https://otter.ai/u/rWovEx4R_jTrqJlTSRfLwp60E-A?tab=summary&t=1460s">24:19</a>
<ul>
<li>Active scanning involves customizing security measures based on specific devices, while passive discovery tends to be more costly and effortful.</li>
<li>Huxley discusses the challenges of passive discovery in network traffic analysis, including the need for multiple collectors and the difficulty of deploying collectors in the right locations.</li>
<li>Huxley also highlights the advantages of active scanning over passive discovery, including the ability to be targeted and thorough in gathering information.</li>
</ul>
</li>
<li><b>OT security challenges and ransomware attacks.</b> <a href="https://otter.ai/u/rWovEx4R_jTrqJlTSRfLwp60E-A?tab=summary&t=1739s">28:58</a>
<ul>
<li>Organizations prioritize availability over security in OT environments, leading to potential exposure to penetration.</li>
<li>Huxley predicts decrease in cyber attacks due to increased payoffs.</li>
<li>Huxley believes there are more adversaries lurking in OT environments than known breaches, with a ratio of 50x on the OT side compared to 5x on the IT side.</li>
<li>Huxley thinks nation-state actors are waiting for political and military situations to make their moves, while financially driven actors are waiting for the right opportunity to strike.</li>
</ul>
</li>
<li><b>Security programs and protocols for OTC organizations.</b> <a href="https://otter.ai/u/rWovEx4R_jTrqJlTSRfLwp60E-A?tab=summary&t=2149s">35:48</a>
<ul>
<li>Scott MacKenzie and Huxley discuss the importance of security programs in organizations, with Huxley mentioning the need for a security program at every organization with an OTC.</li>
<li>Speaker 3 will be at the ICS village conference, showcasing Ron zero's solutions for detecting protocols and devices in a mock network environment.</li>
</ul>
</li>
<li><b>Cybersecurity and industry connections.</b> <a href="https://otter.ai/u/rWovEx4R_jTrqJlTSRfLwp60E-A?tab=summary&t=2386s">39:45</a>
<ul>
<li>Huxley shares his expertise on cybersecurity and asset protection in the industrial sector.</li>
</ul>
</li>
</ul>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p>Finally, get your exclusive free access to the <a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener">Industrial Academy</a> and a series on “<a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener"><strong>Why You Need To Podcast</strong></a>” for Greater Success in 2024. All links designed for keeping you current in this rapidly changing Industrial Market. Learn! Grow! Enjoy!</p>
<h2>HUXLEY BARBEE'S CONTACT INFORMATION:</h2>
<p><strong>Personal LinkedIn: </strong><a href="https://www.linkedin.com/in/jhbarbee/" target="_blank" rel="noopener">https://www.linkedin.com/in/jhbarbee/</a></p>
<p><strong>Company LinkedIn:</strong> <a href="https://www.linkedin.com/company/runzero/" target="_blank" rel="noopener">https://www.linkedin.com/company/runzero/</a></p>
<p><strong>Company Website: </strong><a href="https://www.runzero.com/" target="_blank" rel="noopener">https://www.runzero.com/</a></p>
<h2>PODCAST VIDEO:</h2>
<p><iframe loading="lazy" title="Huxley Barbee | Security Evangelist | runZero | OT Security vs IT and Passive vs Active Scanning" width="500" height="281" src="https://www.youtube.com/embed/TpLNFk3hR_Q?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen></iframe></p>
<h2>OTHER GREAT INDUSTRIAL RESOURCES:</h2>
<p><strong>NEOM</strong>: <a href="https://www.neom.com/en-us" target="_blank" rel="noopener">https://www.neom.com/en-us</a></p>
<p><strong>Fictiv:</strong> <a href="https://www.fictiv.com/" target="_blank" rel="noopener">https://www.fictiv.com/</a></p>
<p><strong>Hexagon</strong>:  <a href="https://hexagon.com/solutions/enterprise-asset-management" target="_blank" rel="noopener">https://hexagon.com/solutions/enterprise-asset-management</a></p>
<p><strong>Palo Alto Networks</strong>: <a href="https://www.paloaltonetworks.com/" target="_blank" rel="noopener">https://www.paloaltonetworks.com/</a></p>
<p><strong>Hitachi Vantara:</strong> <a href="https://www.hitachivantara.com/en-us/home.html" target="_blank" rel="noopener">https://www.hitachivantara.com/en-us/home.html</a></p>
<p><strong>CAP Logistics:</strong> <a href="https://www.caplogistics.com/" target="_blank" rel="noopener">https://www.caplogistics.com/</a></p>
<p><strong>Armis:</strong> <a href="https://www.armis.com/" target="_blank" rel="noopener">https://www.armis.com/</a></p>
<p><strong>Saviant Consulting:</strong> <a href="https://www.saviantconsulting.com/" target="_blank" rel="noopener">https://www.saviantconsulting.com/</a></p>
<p><strong>Industrial Marketing Solutions:</strong>  <a href="https://industrialtalk.com/industrial-marketing/" target="_blank" rel="noopener">https://industrialtalk.com/industrial-marketing/</a></p>
<p><strong>Industrial Academy:</strong> <a href="https://industrialtalk.com/industrial-academy/" target="_blank" rel="noopener">https://industrialtalk.com/industrial-academy/</a></p>
<p><strong>Industrial Dojo:</strong> <a href="https://industrialtalk.com/industrial_dojo/" target="_blank" rel="noopener">https://industrialtalk.com/industrial_dojo/</a></p>
<p><strong>We the 15:</strong><a href="https://www.wethe15.org/" target="_blank" rel="noopener"> https://www.wethe15.org/</a></p>
<h2>YOUR INDUSTRIAL DIGITAL TOOLBOX:</h2>
<p><strong>LifterLMS:</strong> Get One Month Free for $1 – <a href="https://lifterlms.com/" target="_blank" rel="noopener">https://lifterlms.com/</a></p>
<p><strong>Active Campaign:</strong> <a href="https://www.activecampaign.com/?_r=H855VEPU" target="_blank" rel="noopener">Active Campaign Link</a></p>
<p><strong>Social Jukebox:</strong> <a href="https://www.socialjukebox.com/" target="_blank" rel="noopener">https://www.socialjukebox.com/</a></p>
<h2>Industrial Academy (One Month Free Access And One Free License For Future Industrial Leader):</h2>
<p><a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-admin/wp-content/uploads/2019/10/Industrial-Academy-Graphic.png" width="1024" height="538" /></a></p>
<h2>Business Beatitude the Book</h2>
<p><img loading="lazy" decoding="async" class="alignleft" src="https://industrialtalk.com/wp-content/uploads/2019/10/BB-Book-Cover.png" width="138" height="215" /></p>
<p class="ql-align-center">Do you desire a more joy-filled, deeply-enduring sense of accomplishment and success? Live your business the way you want to live with the BUSINESS BEATITUDES&#8230;The Bridge connecting sacrifice to success. <strong>YOU NEED THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><strong>TAP INTO YOUR INDUSTRIAL SOUL, RESERVE YOUR COPY NOW! BE BOLD. BE BRAVE. DARE GREATLY AND CHANGE THE WORLD. GET THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><a href="https://industrialtalk.com/business-beatitude-reserve/" target="_blank" rel="noopener"> Reserve My Copy and My 25% Discount</a></p>
</div>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/huxley-barbee-runzero/">Huxley Barbee with runZero</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://industrialtalk.com/episodes/huxley-barbee-runzero/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://podcasts.captivate.fm/media/f1dff571-11d3-40b7-a242-8b3b9538bae1/Huxley-Barbee-Conversation-Mp3.mp3" length="60416495" type="audio/mpeg" />

			</item>
		<item>
		<title>Ahmik Hindman with Rockwell Automation</title>
		<link>https://industrialtalk.com/episodes/ahmik-hindman-with-rockwellautomation/</link>
					<comments>https://industrialtalk.com/episodes/ahmik-hindman-with-rockwellautomation/#respond</comments>
		
		<dc:creator><![CDATA[Scott MacKenzie]]></dc:creator>
		<pubDate>Thu, 05 Oct 2023 15:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://industrialtalk.com/captivate-podcast/ahmik-hindman-with-rockwell-automation</guid>

					<description><![CDATA[<p>Collaboration and information sharing are crucial in the cybersecurity landscape. There are various platforms and initiatives where manufacturers can share threat intelligence, experiences, and best practices. One notable example is the **Industrial Control Systems Cyber Emergency Response Team (ICS-CERT)**, a division of the U.S. Department of Homeland Security. ICS-CERT provides a platform for critical infrastructure owners and operators to report cybersecurity incidents and receive assistance in incident response and recovery.</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/ahmik-hindman-with-rockwellautomation/">Ahmik Hindman with Rockwell Automation</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="cfm-player-iframe" style="width: 100%; height: 170px; margin-bottom: 20px; border-radius: 10px; overflow:hidden; border: 1px solid #d6d6d6;"><iframe style="width: 100%; height: 170px;" frameborder="no" scrolling="no" seamless allow="autoplay" src="https://player.captivate.fm/58002560-cb29-466d-8c6b-d520e5557f6d"></iframe></div><p><strong><em>Industrial Talk </em></strong>is chatting with <b>Ahmik Hindman, Sr. Network and Security Solutions Consultant with Rockwell Automation </b>about “Security solutions for protecting your connected assets and operations”.  The following is a summary of our conversation:</p>
<div>
<div>
<p>Collaboration and information sharing are crucial in the cybersecurity landscape. There are various platforms and initiatives where manufacturers can share threat intelligence, experiences, and best practices. One notable example is the **Industrial Control Systems Cyber Emergency Response Team (ICS-CERT)**, a division of the U.S. Department of Homeland Security. ICS-CERT provides a platform for critical infrastructure owners and operators to report cybersecurity incidents and receive assistance in incident response and recovery.</p>
<p>Additionally, there are industry-specific Information Sharing and Analysis Centers (ISACs) and Information Sharing and Analysis Organizations (ISAOs) where companies within the same sector share cybersecurity information. These platforms facilitate collaboration and enable organizations to stay updated on emerging threats and mitigation strategies.</p>
<p>Furthermore, private cybersecurity firms often host forums and conferences where professionals can network, share insights, and discuss the latest developments in the field. These collaborative efforts help manufacturers enhance their cybersecurity postures by learning from the experiences of others and staying informed about evolving threats.</p>
</div>
<p>Finally, get your exclusive free access to the <a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener">Industrial Academy</a> and a series on “<a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener"><strong>Why You Need To Podcast</strong></a>” for Greater Success in 2023. All links designed for keeping you current in this rapidly changing Industrial Market. Learn! Grow! Enjoy!</p>
<h2>AHMIK HINDMAN'S CONTACT INFORMATION:</h2>
<p><strong>Personal LinkedIn: </strong><a href="https://www.linkedin.com/in/ahmik-hindman/" target="_blank" rel="noopener">https://www.linkedin.com/in/ahmik-hindman/</a></p>
<p><strong>Company LinkedIn:</strong> <a href="https://www.linkedin.com/company/rockwell-automation/" target="_blank" rel="noopener">https://www.linkedin.com/company/rockwell-automation/</a></p>
<p><strong>Company Website:</strong> <a href="https://www.rockwellautomation.com/" target="_blank" rel="noopener">https://www.rockwellautomation.com/</a></p>
<h2>PODCAST VIDEO:</h2>
<p><iframe loading="lazy" title="Ahmik Hindman | Rockwell Automation | Securing your Connected Assets | Industrial Talk" width="500" height="281" src="https://www.youtube.com/embed/GTPuX3INfRs?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen></iframe></p>
<h2>THE STRATEGIC REASON &#8220;WHY YOU NEED TO PODCAST&#8221;:</h2>
<p><a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-content/uploads/2020/02/Why-you-need-to-Podcast-Graphic-2.png" width="1024" height="538" /></a></p>
<h2>OTHER GREAT INDUSTRIAL RESOURCES:</h2>
<p><strong>NEOM</strong>: <a href="https://www.neom.com/en-us" target="_blank" rel="noopener">https://www.neom.com/en-us</a></p>
<p><strong>Fictiv:</strong> <a href="https://www.fictiv.com/" target="_blank" rel="noopener">https://www.fictiv.com/</a></p>
<p><strong>Hexagon</strong>:  <a href="https://hexagon.com/solutions/enterprise-asset-management" target="_blank" rel="noopener">https://hexagon.com/solutions/enterprise-asset-management</a></p>
<p><strong>Arduino Pro</strong>:  <a href="https://www.arduino.cc/pro/" target="_blank" rel="noopener">https://www.arduino.cc/pro/</a></p>
<p><strong>Hitachi Vantara:</strong> <a href="https://www.hitachivantara.com/en-us/home.html" target="_blank" rel="noopener">https://www.hitachivantara.com/en-us/home.html</a></p>
<p><strong>CAP Logistics:</strong> <a href="https://www.caplogistics.com/" target="_blank" rel="noopener">https://www.caplogistics.com/</a></p>
<p><strong>Armis:</strong> <a href="https://www.armis.com/" target="_blank" rel="noopener">https://www.armis.com/</a></p>
<p><strong>Saviant Consulting:</strong> <a href="https://www.saviantconsulting.com/" target="_blank" rel="noopener">https://www.saviantconsulting.com/</a></p>
<p><strong>Industrial Marketing Solutions:</strong>  <a href="https://industrialtalk.com/industrial-marketing/" target="_blank" rel="noopener">https://industrialtalk.com/industrial-marketing/</a></p>
<p><strong>Industrial Academy:</strong> <a href="https://industrialtalk.com/industrial-academy/" target="_blank" rel="noopener">https://industrialtalk.com/industrial-academy/</a></p>
<p><strong>Industrial Dojo:</strong> <a href="https://industrialtalk.com/industrial_dojo/" target="_blank" rel="noopener">https://industrialtalk.com/industrial_dojo/</a></p>
<p><strong>We the 15:</strong><a href="https://www.wethe15.org/" target="_blank" rel="noopener"> https://www.wethe15.org/</a></p>
<h2>YOUR INDUSTRIAL DIGITAL TOOLBOX:</h2>
<p><strong>LifterLMS:</strong> Get One Month Free for $1 – <a href="https://lifterlms.com/" target="_blank" rel="noopener">https://lifterlms.com/</a></p>
<p><strong>Active Campaign:</strong> <a href="https://www.activecampaign.com/?_r=H855VEPU" target="_blank" rel="noopener">Active Campaign Link</a></p>
<p><strong>Social Jukebox:</strong> <a href="https://www.socialjukebox.com/" target="_blank" rel="noopener">https://www.socialjukebox.com/</a></p>
<h2>Industrial Academy (One Month Free Access And One Free License For Future Industrial Leader):</h2>
<p><a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-admin/wp-content/uploads/2019/10/Industrial-Academy-Graphic.png" width="1024" height="538" /></a></p>
<h2>Business Beatitude the Book</h2>
<p><img loading="lazy" decoding="async" class="alignleft" src="https://industrialtalk.com/wp-content/uploads/2019/10/BB-Book-Cover.png" width="138" height="215" /></p>
<p class="ql-align-center">Do you desire a more joy-filled, deeply-enduring sense of accomplishment and success? Live your business the way you want to live with the BUSINESS BEATITUDES&#8230;The Bridge connecting sacrifice to success. <strong>YOU NEED THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><strong>TAP INTO YOUR INDUSTRIAL SOUL, RESERVE YOUR COPY NOW! BE BOLD. BE BRAVE. DARE GREATLY AND CHANGE THE WORLD. GET THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><a href="https://industrialtalk.com/business-beatitude-reserve/" target="_blank" rel="noopener"> Reserve My Copy and My 25% Discount</a></p>
</div>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/ahmik-hindman-with-rockwellautomation/">Ahmik Hindman with Rockwell Automation</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://industrialtalk.com/episodes/ahmik-hindman-with-rockwellautomation/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://podcasts.captivate.fm/media/4257ed68-dbef-44e8-95cf-66adac58070a/Ahmik-Hindman-Conversation-Rockwell-Mp3.mp3" length="46802159" type="audio/mpeg" />

			</item>
		<item>
		<title>Mike Brattain with Systems X</title>
		<link>https://industrialtalk.com/episodes/mike-brattain-systems-x/</link>
					<comments>https://industrialtalk.com/episodes/mike-brattain-systems-x/#respond</comments>
		
		<dc:creator><![CDATA[Scott MacKenzie]]></dc:creator>
		<pubDate>Wed, 18 Jan 2023 15:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://industrialtalk.com/captivate-podcast/mike-brattain-systems-x</guid>

					<description><![CDATA[<p>On this week's Industrial Talk we're onsite at FABTECH in Atlanta, GA and talking to Mike Brattain, Account Executive with Systems X about "Manufacturers must secure their business to succeed". Get the answers to your "Cyber" questions along with Mike's unique insight on the “How” on this Industrial Talk interview!</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/mike-brattain-systems-x/">Mike Brattain with Systems X</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="cfm-player-iframe" style="width: 100%; height: 170px; margin-bottom: 20px; border-radius: 10px; overflow:hidden; border: 1px solid #d6d6d6;"><iframe style="width: 100%; height: 170px;" frameborder="no" scrolling="no" seamless allow="autoplay" src="https://player.captivate.fm/6a005b34-dfe6-4671-8db8-2247071dec67"></iframe></div><p>On this week's <strong><em>Industrial Talk </em></strong>we're onsite at <a href="https://www.fabtechexpo.com/" target="_blank" rel="noopener"><strong>FABTECH</strong> </a>in Atlanta, GA and talking to <strong>Mike Brattain, Account Executive with Systems X </strong>about <b>&#8220;Manufacturers must secure their business to succeed&#8221;</b>. Get the answers to your &#8220;Cyber&#8221; questions along with Mike's unique insight on the “How” on this Industrial Talk interview!</p>
<p>Finally, get your exclusive free access to the <a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener">Industrial Academy</a> and a series on “<a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener"><strong>Why You Need To Podcast</strong></a>” for Greater Success in 2023. All links designed for keeping you current in this rapidly changing Industrial Market. Learn! Grow! Enjoy!</p>
<h2>MIKE BRATTAIN'S CONTACT INFORMATION:</h2>
<p><strong>Personal LinkedIn: </strong><a href="https://www.linkedin.com/in/mikecharlesbrattain/" target="_blank" rel="noopener">https://www.linkedin.com/in/mikecharlesbrattain/</a></p>
<p><strong>Company LinkedIn: </strong><a href="https://www.linkedin.com/company/systemsx/" target="_blank" rel="noopener">https://www.linkedin.com/company/systemsx/</a></p>
<p><strong>Company Website: </strong><a href="https://www.systems-x.com/en-us/" target="_blank" rel="noopener">https://www.systems-x.com/en-us/</a></p>
<h2>PODCAST VIDEO:</h2>
<p><iframe loading="lazy" title="Mike Brattain with Systems X live at FABTECH 2022" width="500" height="281" src="https://www.youtube.com/embed/SlI33pEPdxI?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen></iframe></p>
<h2>THE STRATEGIC REASON &#8220;WHY YOU NEED TO PODCAST&#8221;:</h2>
<p><a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-content/uploads/2020/02/Why-you-need-to-Podcast-Graphic-2.png" width="1024" height="538" /></a></p>
<h2>OTHER GREAT INDUSTRIAL RESOURCES:</h2>
<p><strong>NEOM</strong>: <a href="https://www.neom.com/en-us" target="_blank" rel="noopener">https://www.neom.com/en-us</a></p>
<p><strong>Hitachi Vantara:</strong> <a href="https://www.hitachivantara.com/en-us/home.html" target="_blank" rel="noopener">https://www.hitachivantara.com/en-us/home.html</a></p>
<p><strong>Industrial Marketing Solutions:</strong>  <a href="https://industrialtalk.com/industrial-marketing/" target="_blank" rel="noopener">https://industrialtalk.com/industrial-marketing/</a></p>
<p><strong>Industrial Academy:</strong> <a href="https://industrialtalk.com/industrial-academy/" target="_blank" rel="noopener">https://industrialtalk.com/industrial-academy/</a></p>
<p><strong>Industrial Dojo:</strong> <a href="https://industrialtalk.com/industrial_dojo/" target="_blank" rel="noopener">https://industrialtalk.com/industrial_dojo/</a></p>
<p><strong>We the 15:</strong><a href="https://www.wethe15.org/" target="_blank" rel="noopener"> https://www.wethe15.org/</a></p>
<h2>YOUR INDUSTRIAL DIGITAL TOOLBOX:</h2>
<p><strong>LifterLMS:</strong> Get One Month Free for $1 – <a href="https://lifterlms.com/" target="_blank" rel="noopener">https://lifterlms.com/</a></p>
<p><strong>Active Campaign:</strong> <a href="https://www.activecampaign.com/?_r=H855VEPU" target="_blank" rel="noopener">Active Campaign Link</a></p>
<p><strong>Social Jukebox:</strong> <a href="https://www.socialjukebox.com/" target="_blank" rel="noopener">https://www.socialjukebox.com/</a></p>
<h2>Industrial Academy (One Month Free Access And One Free License For Future Industrial Leader):</h2>
<p><a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-admin/wp-content/uploads/2019/10/Industrial-Academy-Graphic.png" width="1024" height="538" /></a></p>
<h2>Business Beatitude the Book</h2>
<p><img loading="lazy" decoding="async" class="alignleft" src="https://industrialtalk.com/wp-content/uploads/2019/10/BB-Book-Cover.png" width="138" height="215" /></p>
<p class="ql-align-center">Do you desire a more joy-filled, deeply-enduring sense of accomplishment and success? Live your business the way you want to live with the BUSINESS BEATITUDES&#8230;The Bridge connecting sacrifice to success. <strong>YOU NEED THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><strong>TAP INTO YOUR INDUSTRIAL SOUL, RESERVE YOUR COPY NOW! BE BOLD. BE BRAVE. DARE GREATLY AND CHANGE THE WORLD. GET THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><a href="https://industrialtalk.com/business-beatitude-reserve/" target="_blank" rel="noopener"> Reserve My Copy and My 25% Discount</a></p>
<h2>PODCAST TRANSCRIPT:</h2>
<p><strong>SUMMARY KEYWORDS</strong></p>
<p>business, conversation, companies, cybersecurity, industrial, cyber, manufacturers, Systems X, secure, mike, absolutely, security, find, people, industry, attack, digital transformation journey, put, manage, data</p>
<p>00:00</p>
<p>Industrial Talk is brought to you by Armis. Yes, you were in the digital transformation game. Yes, you need to find trusted companies, trusted individuals to help you along with that journey. The Armis platform delivers complete asset intelligence, you know what that means? insights into your connected assets, you're in the digital transformation game, you have to have that insights into what is connected. Go to Armis.com Find out more, you will not be disappointed. Industrial Talk is brought to you by Arduino the original all in one IoT platform. That's right, go out to arduino.cc and you will find documentation you will find devices powerful boards to help you with your digital transformation journey. It's all there. Go out to arduino.cc Find out more see how you can connect with these professionals to help you along with your digital transformation journey arduino.cc.</p>
<p>01:07</p>
<p>Welcome to the industrial talk podcast with Scott Mackenzie. Scott is a passionate industry professional dedicated to transferring cutting edge Industry Focus innovations and trends while highlighting the men and women who keep the world moving. So put on your hardhat grab your work boots, and let's go</p>
<p>01:25</p>
<p>Alright, what's good, thank you very much for joining industrial talk we are broadcasting here at FABTECH. Atlanta, Georgia, it is day three, and has been a man I'm telling it's been a barnburner of companies that have just innovated the heck out of their solutions and providing solutions to your problems. More importantly. And once again, we're just having a ball. So you got to put this one on your calendar big time you got to put this this event if you're not here this year, go next year, you will not be disappointed. You're going to be bigger and better. Most definitely. All right. We got a gentleman by the name of Mike, say your last name.</p>
<p>02:02</p>
<p>It's Brattain</p>
<p>02:04</p>
<p>Systems X. With the s on that Systems X. Let's get cracking. cybersecurity, right. Absolutely. And that's something you know, it's sort of an odd thing. One, that your job never gets old?</p>
<p>02:23</p>
<p>No, no, it's becoming more and more important. You know, we are managed security service provider just north of Detroit. And look, I'm amongst my people right now. These are these are manufacturers that are looking to take technology and gain a competitive edge with it. And so 60% of our our business base is manufacturing. So So these are my people hear</p>
<p>02:50</p>
<p>Yeah. And there's three huge conference halls of your people. Oh, yeah, here. It's massive. And it's everything's here. Yeah, everything. Yeah, let me ask you this, a lot of buzzy buzz out there. And I agree with it. 100%. But but one of the areas that everybody talks about, of course, I need to have that ability to connect my assets, I need to I have to have to start pulling that data, I have to start looking at that data, I've got to figure out how to make tactical decisions based off of the data of my assets. That's wrong. But every time they connect, it's an IoT device. The conversation rarely happens around cyber now. And if you want to be competitive, you've got to have that cyber conversation at the beginning. Is that true?</p>
<p>03:37</p>
<p>Absolutely. You know, we tell our customers, we are a cyber first company. And the reason is, Why manage your data. If you're not going to protect your data. This is no longer an option. It is a cost of doing business, you know, as as a leadership of your manufacturing company, your most valuable asset is your ability to do business. And the stats are out there. And these aren't scare tactics, but oh no, the downtime of a manufacturer is roughly $5,600 a minute. The average ransomware that the manufacturing industry.</p>
<p>04:15</p>
<p>I'm gonna stop you right there. Yeah. $5,600 a minute. Yeah, that's sort of average. That's sort of a big smile. It doesn't matter average. $5,600 a minute. Yeah, continue. I interrupted because I I'll just zone in on number. Yeah,</p>
<p>04:30</p>
<p>no, that's right. It's not feelings. It's it's facts. data, right. thing, but, but yeah, and then, you know, your average ransomware in the manufacturing industries got up to $2 million. Gosh, you know, and so, once you learn that ability, it will lose that ability to earn then then you lose your business. Yeah, I</p>
<p>04:53</p>
<p>this just popped into my head ever so fleeting. Are there insurance companies that are saying, Hey, I know ransom Where attacks are out there. They just don't just whether you like it or not, whether you hear my voice, they are out there. But to be able to sort of wrap it in an insurance policy, can they do that?</p>
<p>05:10</p>
<p>Yeah. So you're touching on a a crazy subject, it is the Wild West when it comes to cyber insurance right now. So companies looked at that as an opportunity, right? So when cyber-attacks really started to skyrocket, they were like, oh, an insurance companies never lose. Right. So now they're sitting there going, well, we're gonna have to start backtracking, what our coverages and start putting different things in our policy that we're not going to cover, like, let's say, a attack from a foreign country, you know, well, most of your cyber-attacks are from foreign men, and they are here. Yeah. So yeah, in the tough part is now most companies most most manufacturers, don't have the required cybersecurity measures in place to even qualify for proper cyber insurance. And so that is, it's a, it's a difficult situation right now.</p>
<p>06:03</p>
<p>But what I think you can mitigate it, if you connect with organizations like yours, and be able to have that conversation of fraud. Yep. And be able to know that, hey, here's where I want to go. How do we make sure that my data is secure, my business is secure, so that we can continue to do what we do best by that service? So, again, it's a cotton, it's a conversation, but if you find people not wanting to have that conversation?</p>
<p>06:32</p>
<p>Absolutely. And it's because they don't understand it, right? Some companies, a lot of times they hear look, we're too small, no, no. Right. And I always do the comparison of, you're looking at two houses and one doors locked and one door is not, I'm the bad guy, I'm going in the unlocked door, at least have some sort of security in place, because there's so much low hanging fruit there. But you know, being able to prove that you're secure, that's why I think a lot of the sea levels avoid that conversation. Because usually they have that IT person talking a different language, that doesn't make sense to transmit, you know, and so, yeah, that's, that's the conversation have more of a strategy behind behind the cybersecurity,</p>
<p>07:18</p>
<p>I find, it doesn't have to be, there's the buzz that says, hey, you're gonna lock me down, and I'm not going to be able to do anything, I'm not going to be able to do my business, you're gonna lock me down so tight, I won't be able to do anything. And that's, that's one faults, don't go down that road. But two, if you can create some, some firewall, some sort of way of preventing, or making it difficult for the various behavior to say, they're lazy just like me, they're going to just try to find that simple penetration point, and just, you know, exploit that. So they're going to go on to something else, at least make it a little bit more difficult.</p>
<p>07:58</p>
<p>Yeah, absolutely. Some ways that you can improve your cyber posture, because let's face it firewall and all that that's, that's kind of a thing of the past. They're, they're blown by that like nothing, looking at managed detection and response, but really putting a foundation in place 30% of that 60% manufacturers we work with are in the Defense Supply Chain, they have to meet very stringent, stringent standards now called NIST and cmmc. So we would go in and build that foundation around NIST, it's a set of controls, that now gets the whole company from the top down on the same goal, and making sure that it's not just software, a very small portion of your cybersecurity is going to be software, it is that strategy from from the top down and it becomes part of the DNA of your company. And in no way like you said, should it lock your company down? It has to make common sense for the business.</p>
<p>08:52</p>
<p>And it's not static. It's an ongoing, continuous continuous it because if you think you're it, things change. Now, businesses change. If you're plopping this out there, you're doing whatever is necessary or you're trying to make your business more efficient. That has to be also in light of your cyber and your security strategy. Oh, that business? Yeah.</p>
<p>09:16</p>
<p>Yeah. And like I said, the way you manage your it is very important, because that is all the system updates and the different settings you have throughout your organization. That's a large part of your your cybersecurity Foundation. And from there, you start getting more technical on what are some things we can do to really make sure we lock these guys out. But I tell you what, as as you're looking to find that help for cybersecurity, and how do you tackle that, that giant beasts, the weight in gold for organizations like Systems X x is not. It's not, you know, getting, stopping the attack. It's when you get attacked, what happens after that? How quick can we take the little spark that little fire and hurry up and jump in, put that out, and then put the incident response plan in place. You know, when I talked to when I talked to CEOs, they say, Well, how do I even know if I'm secure? Well, most of them are getting the reports and things they understand. But I just say, hey, ask your IT support, whoever that is to hand you have an incident response plan. And if they can't hand you one in 10 minutes, you have a major problem.</p>
<p>10:25</p>
<p>That sounds Yeah, so let's let's sort of do a little roleplay. Here. I'm a I'm a small manufacturer, let's keep it small. How would you approach my business? Just generally speaking, that hey, get on in here, check it out. Please tell me tell me what we need to do.</p>
<p>10:43</p>
<p>Yeah. Having a business conversation, talking maybe less about the IT and more about what are the goals for the organization? What are some things they're trying to do moving forward? We're always taking that business strategy approach. I'll let you in on a little secret. I knew nothing about it. Three years ago, I came to Systems X X and said, Hey, look, I know, I know, business. I know, C level, I understand how their minds work. Why don't you teach me a little bit about it. So we can start making that connection? Because they're just sick of hearing it jargon constantly brought to them. Yeah, but really that question of how do you manage it? Do I have an IT department come in very expensive? Do I outsource all of it, we're finding right now. Get yourself that mid-level IT person, you know, and then outsource the heavy lifting, outsource the 24/7 monitoring the cybersecurity all the things that it's hard for that one person to do. But it's important to have that one person in your organization being able to take all the quick light work that needs to happen. And companies would should help that IT person grow within the company and understand how to also, you know, work as a team to make sure they're secure.</p>
<p>11:59</p>
<p>Do you? Do you have the conversation with the it? Yeah, where it's saying, Hey, don't be so it ash? You be a little bit more human and less cyborg? Like,</p>
<p>12:11</p>
<p>it's not in their DNA? You know, it's not, it's not what they want to do. But look, that's a fun conversation when I have the person and the CEO there. And they look at each other like, Oh, hey, yeah, you.</p>
<p>12:25</p>
<p>And then it's all acronyms on both sides. Don't get me wrong. It's on both sides.</p>
<p>12:29</p>
<p>Well, when I asked the question of, Hey, how is it supporting sales today? And they look at me like what? And so those are the types of questions we got to start having? How do we gain that competitive edge for you, you know, I talked to companies all time, especially your sea level, and I say, Look, you put your bid in and another company puts their bid, and I would be touting my cybersecurity posture from the mountaintop. And the reason is, it's going to shadow and put doubt on the company you're going against. Because look, whether it's DoD or its commercial, this is coming companies are asking for your cybersecurity possible policy, they're looking for your system security plan, they want to know that. So</p>
<p>13:09</p>
<p>before they do business, I had a conversation with somebody else on this, and they do island hopping. So if you have vendors, and they're connected to your system, because they want connectivity, if I'ma if I want my vendors to be able to transmit information, I gotta have them connected. So what happens is that they Island hop these these nefarious characters, and they'll try to penetrate the bigger company through those. And again, to your point, you're gonna have to have that conversation, I want you to be secure, right? Well, that's exactly</p>
<p>13:39</p>
<p>what's happening in the defensive supply chain. There is it's no coincidence that our F 35. There's the same f 35 sitting in in China right now, what they do is they grab that small mom car manufacturer that made just make a tiny part. And they ride that all the way to the top. And that's why now the primes are looking down saying, Look, no more. In order for us to give you a contract, you gotta meet these standards. And the government is not joking around anymore. I mean, these manufacturers have to get there. But then the next year.</p>
<p>14:11</p>
<p>It's reasonable. No, I mean, it just it and it's so funny. I struggle with companies talking about cyber, just companies like hey, what do you do? Well, we manufacture widgets. Tell me about your cyber Nope. Not going to talk about it. Yeah. And that conversation, it just, I understand the reality that you don't want to just, you know, air your dirty laundry and be able to do that. But I think at a minimum you need to have trusted individuals that you can have conversation and lock it down.</p>
<p>14:39</p>
<p>Yeah, even when you're attacked, even after your attack. Yeah, absolutely. I was. I was so happy to see here on stage. I don't know. I think it was the first day. The gentleman that THAT'S IT manager for Wilson tool. That that was an amazing story that they told and put their name out there to say Yeah, we were attacked. This is how we handled it. And I Yeah, I know I want. I was like, wow. But I tell you what, that's the important thing is you're telling the community what happened. It only secures all of us together.</p>
<p>15:11</p>
<p>See? And that's, we're getting there. You're getting there. I mean, I love this conversation. No, yeah. I know people get a hold on.</p>
<p>15:19</p>
<p>Yeah. So they can go to Systems X dash x.com They can actually reach me directly at 586-500-1001. And, look, I love having these conversations all day long. It's just a conversation</p>
<p>15:35</p>
<p>is Come on. Let's put our adult pants on. Yeah, let's have this conversation. Here you go. It's gonna be painless. Mike would greatly appreciate it. I like this. Thank you. A better person because of you. There you go. All right. Once again, we're broadcasting from FABTECH here in Atlanta, Georgia. Again, great people like Mike solving problems, and willing to have a conversation, we're gonna have all the contact information for Mike and his company out on industrial talk. Just go there and find his his conversation boom, connect, you will not be disappointed because he's gonna want to check with you. No obligation, right? No obligation</p>
<p>16:14</p>
<p>whatsoever.</p>
<p>16:16</p>
<p>When when all around? Absolutely. All right. All right, we're gonna be right back. So stay tuned.</p>
<p>16:22</p>
<p>You're listening to the industrial talk, Podcast Network.</p>
<p>16:27</p>
<p>All right, thank you, again, for joining industrial talk for your support, and your support, have an ever expanding industrial ecosystem of problem solvers. Like Mike, you're gonna go out to industrial talk, you're going to reach out to Mike Mike will definitely set you in the right direction. We need to be about protecting if you're in the digital transformation world, which you should be. And if you're saying this is what this is how we create a business that is resilient, which it does. And you need, you need Sherpas, you need professionals that you can trust, which is Mike, you need a security, you need a security, you need to do that. And you need to do it upfront. And it just, you just have to, yeah, there's no other way of getting around it. And because we want you to succeed, this platform is all about your success, and delivering the solutions and delivering the information and educating as much as we possibly can on how you industry can succeed. Now, again, reach out to me go out to industrial talk, you want to be on the podcast, yes, make it happen. You're going to be out in the bent, like conference or some other thing that you're going to be out and you're saying, Scott, I want to have you there. You just got to let me know. I would love to be able to read minds, but that's just not going to be the case. And I would be more than honored to be able to help you in your efforts to create that resilient industrial business. Alright. Industrial talk.com People will be brave. They are greatly hanging out with people like Mike, you're going to change the world. Thank you very much. We're gonna have another great conversation coming from FABTECH shortly so do not go away.</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/mike-brattain-systems-x/">Mike Brattain with Systems X</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://industrialtalk.com/episodes/mike-brattain-systems-x/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://podcasts.captivate.fm/media/d274239f-32e7-4c9c-b3d9-0b70fa4bb721/Mike-Brattain-SystemX-FABTECH-Mp3.mp3" length="26184239" type="audio/mpeg" />

			</item>
		<item>
		<title>Keao Caindec with Farallon Technology Group</title>
		<link>https://industrialtalk.com/episodes/keao-caindec-farallontech/</link>
					<comments>https://industrialtalk.com/episodes/keao-caindec-farallontech/#respond</comments>
		
		<dc:creator><![CDATA[Scott MacKenzie]]></dc:creator>
		<pubDate>Tue, 03 Jan 2023 15:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://industrialtalk.com/captivate-podcast/keao-caindec-farallontech</guid>

					<description><![CDATA[<p>Industrial Talk is onsite at the OMG Quarterly Standards Meeting and speaking with Keao Caindec, CEO and Principal Analyst with Farallon Technology Group about cybersecurity and how it's crucial for industrial companies to protect themselves. With the increasing reliance on internet-based technologies, it's more important than ever to have conversations about cybersecurity and collaborate with others in the industry to stay secure. Tune in to hear more about the importance of cybersecurity in the industrial world.</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/keao-caindec-farallontech/">Keao Caindec with Farallon Technology Group</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="cfm-player-iframe" style="width: 100%; height: 170px; margin-bottom: 20px; border-radius: 10px; overflow:hidden; border: 1px solid #d6d6d6;"><iframe style="width: 100%; height: 170px;" frameborder="no" scrolling="no" seamless allow="autoplay" src="https://player.captivate.fm/cf131e06-d214-4380-9aad-0f0b24504cc7"></iframe></div><p><strong><em>Industrial Talk </em></strong>is onsite at the <a href="https://www.omg.org/events/index.htm" target="_blank" rel="noopener">OMG Quarterly Standards Meeting</a> and speaking with <strong>Keao Caindec, CEO and Principal Analyst </strong>with Farallon Technology Group about cybersecurity and how it's crucial for industrial companies to protect themselves. With the increasing reliance on internet-based technologies, it's more important than ever to have conversations about cybersecurity and collaborate with others in the industry to stay secure. Tune in to hear more about the importance of cybersecurity in the industrial world.</p>
<p>Finally, get your exclusive free access to the <a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener">Industrial Academy</a> and a series on “<a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener"><strong>Why You Need To Podcast</strong></a>” for Greater Success in 2023. All links designed for keeping you current in this rapidly changing Industrial Market. Learn! Grow! Enjoy!</p>
<h2>KEAO CAINDEC'S CONTACT INFORMATION:</h2>
<p><strong>Personal LinkedIn: </strong><a href="https://www.linkedin.com/in/kcaindec/" target="_blank" rel="noopener">https://www.linkedin.com/in/kcaindec/</a></p>
<p><strong>Company LinkedIn: </strong><a href="https://www.linkedin.com/company/farallon-technology-group/" target="_blank" rel="noopener">https://www.linkedin.com/company/farallon-technology-group/</a></p>
<p><strong>Company Website: </strong><a href="https://www.farallontech.com/" target="_blank" rel="noopener">https://www.farallontech.com/</a></p>
<h2>PODCAST VIDEO:</h2>
<p><iframe loading="lazy" title="Keao Caindec, CEO of Farallon Technology Group" width="500" height="281" src="https://www.youtube.com/embed/KKL31FJ6COc?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<h2>THE STRATEGIC REASON &#8220;WHY YOU NEED TO PODCAST&#8221;:</h2>
<p><a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-content/uploads/2020/02/Why-you-need-to-Podcast-Graphic-2.png" width="1024" height="538" /></a></p>
<h2>OTHER GREAT INDUSTRIAL RESOURCES:</h2>
<p><strong>NEOM</strong>: <a href="https://www.neom.com/en-us" target="_blank" rel="noopener">https://www.neom.com/en-us</a></p>
<p><strong>AI Dash:</strong> <a href="https://www.aidash.com/" target="_blank" rel="noopener">https://www.aidash.com/</a></p>
<p><strong>Hitachi Vantara:</strong> <a href="https://www.hitachivantara.com/en-us/home.html" target="_blank" rel="noopener">https://www.hitachivantara.com/en-us/home.html</a></p>
<p><strong>Industrial Marketing Solutions:</strong>  <a href="https://industrialtalk.com/industrial-marketing/" target="_blank" rel="noopener">https://industrialtalk.com/industrial-marketing/</a></p>
<p><strong>Industrial Academy:</strong> <a href="https://industrialtalk.com/industrial-academy/" target="_blank" rel="noopener">https://industrialtalk.com/industrial-academy/</a></p>
<p><strong>Industrial Dojo:</strong> <a href="https://industrialtalk.com/industrial_dojo/" target="_blank" rel="noopener">https://industrialtalk.com/industrial_dojo/</a></p>
<p><strong>We the 15:</strong><a href="https://www.wethe15.org/" target="_blank" rel="noopener"> https://www.wethe15.org/</a></p>
<h2>YOUR INDUSTRIAL DIGITAL TOOLBOX:</h2>
<p><strong>LifterLMS:</strong> Get One Month Free for $1 – <a href="https://lifterlms.com/" target="_blank" rel="noopener">https://lifterlms.com/</a></p>
<p><strong>Active Campaign:</strong> <a href="https://www.activecampaign.com/?_r=H855VEPU" target="_blank" rel="noopener">Active Campaign Link</a></p>
<p><strong>Social Jukebox:</strong> <a href="https://www.socialjukebox.com/" target="_blank" rel="noopener">https://www.socialjukebox.com/</a></p>
<h2>Industrial Academy (One Month Free Access And One Free License For Future Industrial Leader):</h2>
<p><a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-admin/wp-content/uploads/2019/10/Industrial-Academy-Graphic.png" width="1024" height="538" /></a></p>
<h2>Business Beatitude the Book</h2>
<p><img loading="lazy" decoding="async" class="alignleft" src="https://industrialtalk.com/wp-content/uploads/2019/10/BB-Book-Cover.png" width="138" height="215" /></p>
<p class="ql-align-center">Do you desire a more joy-filled, deeply-enduring sense of accomplishment and success? Live your business the way you want to live with the BUSINESS BEATITUDES&#8230;The Bridge connecting sacrifice to success. <strong>YOU NEED THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><strong>TAP INTO YOUR INDUSTRIAL SOUL, RESERVE YOUR COPY NOW! BE BOLD. BE BRAVE. DARE GREATLY AND CHANGE THE WORLD. GET THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><a href="https://industrialtalk.com/business-beatitude-reserve/" target="_blank" rel="noopener"> Reserve My Copy and My 25% Discount</a></p>
<h2>PODCAST TRANSCRIPT:</h2>
<p><strong>SUMMARY KEYWORDS</strong></p>
<p>security, industrial, industry, cybersecurity, document, conversation, device, technology, environments, companies, omg, brisket, collaborate, meeting, people, focused, absolutely, isf, best practices, embedded</p>
<p>00:04</p>
<p>Welcome to the industrial talk podcast with Scott Mackenzie. Scott is a passionate industry professional dedicated to transferring cutting edge industry focused innovations and trends while highlighting the men and women who keep the world moving. So put on your hard hat, grab your work boots, and let's go.</p>
<p>00:21</p>
<p>Alright, once again, thank you very much for joining industrial talk the number one industrial related podcast in the universe. Amazing. And it's called backed up by data.</p>
<p>00:30</p>
<p>Yes, it is. I read that report.</p>
<p>00:34</p>
<p>That was a good one. Well done, man. You just rolled right into it. You can tell he's great. All right. It is a platform dedicated to all industrial professionals around the world because you are bold, brave, you dare greatly you collaborate, you solve problems. You're making my life better. You're making the world a better place. That's what you're all about. Alright. Hey, hey, deck in the hot seat. Bear line? Is the company talking? Can I just say cyber cybersecurity? Absolutely. And then some around let's get cracking. It's a topic that needs more talking about. Absolutely, Scott, without a doubt, you having a good meeting? Just FYI, listeners, I said, I didn't know what to call it. But he said call it meeting. So I'm going to call it a meeting.</p>
<p>01:18</p>
<p>It's a great meeting. It's the Industry Internet Consortium is great group of people committed for a long time in helping industrial companies make sense of the internet internet-based technologies. And, and certainly cybersecurity is one of the most important things that we need to figure out and do well,</p>
<p>01:38</p>
<p>it needs to be it needs to be all of it. I mean, you got to have this conversation. I know everybody's interested in that, hey, how can I digitize my business? It's the right thing to think about. It's the right thing. But I find that there is a necessity to have more conversations around cybersecurity, you're gonna go down that road, got to have that conversation. And I think another area of real importance is where you're going to collaborate, because you don't have all the answers. And the OMG team, the body, the the organization and all of the participants. I'd say collaborate with them.</p>
<p>02:11</p>
<p>Absolutely. Absolutely. It's a great group, which is, you know, because they cover so many different areas, whether it's the digital twin group, part of OMG, the industry, internet. They they're covering a lot of great areas that are important that are overlapping.</p>
<p>02:29</p>
<p>Yeah, without a doubt, and I don't know, but you are here. I have to ask this. The name Farrell on technology group. Yes. What's the meaning behind that? Oh,</p>
<p>02:42</p>
<p>it's great Scot and so the Fairlawn islands are off the coast of San Francisco. Yeah, right. And the Fairlawn islands for for for years has been the breeding ground and for great white sharks. So over the years, it's been this place where seals birds have gone to roost and as a result, sharks come around. So when I formed Fairlawn years ago, more than 10 years ago, we decided to use the Fairlawn name because we felt that it was a great representation of the market, what's important security, and how, you know, you got to make a decision. Are you going to be a shark? Are you going to be a seal?</p>
<p>03:29</p>
<p>That's great, man. I knew it had a meeting. It was it's the ones that I say, hey, what does that mean? The URL URL is valuable. It's a mashing of words. And yeah, it's all good. All right, before we get into the conversation, give us the listeners a little 411 on who Keao is.</p>
<p>03:51</p>
<p>So I'm a longtime participant in the tech industry spent most of my career in telecommunications and networking cybersecurity. Fairlawn provides consulting to industrial companies and cybersecurity vendors. And our sweet spot is really helping companies to figure out what they should be doing to leverage embedded security, Industrial Security and and DevOps security which is really taking the technology down into the the more modern way of deploying and running applications</p>
<p>04:30</p>
<p>definition when we start talking about industrial security, embedded security define those please.</p>
<p>04:37</p>
<p>So unlike traditional security models, like things like firewalls or general enterprise monitoring, the industrial sector has a different environment. They have control systems and these control systems are running on equipment that control things like conveyor belts or pipelines and flow. They operate on oil rigs or in a food processing plant. But but they're typically a combination of old legacy equipment that's no longer supported, and also some modern robotics. So it takes a different way about thinking about security. And a different way of thinking about how you secure these things, all the way down into the core of the machine, which typically involves collaborating with silicon vendors, like Qualcomm and Intel, to secure everything down to the core.</p>
<p>05:47</p>
<p>And my challenge is always that in the world of cyber, in the world of what we're doing here, and the innovation that's taking place within industry, it's constantly changing. It's constantly evolving, you know, if you're one of many that come up with new use cases that you can apply, and then you got to create some, you know, whatever words around that and figure out how to protect that. And that's just a it's an amazing, what you guys do is, is amazing, it's just nothing short of amazing,</p>
<p>06:17</p>
<p>it is evolving at the same time. The majority of devices in industrial environments are more than 15 years old. So you have this big problem of, of, you know, the big headline of digital transformation and industry for Dotto are all great. But the reality is that companies need to advance but they also have this problem of they got a ton of old stuff that they need to protect.</p>
<p>06:49</p>
<p>So I had a conversation with FANUC. And they do the same thing. But from from a CNC perspective. So you have these embedded assets, these old assets, these old great machines, and then they can retrofit them to be more modern, but they still use it. And it's the same thing with you got these legacy embedded assets, that all you need to do is there's only Okay, let's let's tweak it, let's do it. Let's protect it. Let's you know, bring it up to today's standards. But anyway, so you're here at this meeting, the OMG meeting, I am queued for, did you go to q1?</p>
<p>07:24</p>
<p>I did. I went to 2123 and four curcumin,</p>
<p>07:28</p>
<p>I now hit the cycle.</p>
<p>07:31</p>
<p>It's and what a change from the first one where there were just a handful of us still trying to get used to the fact that you know, being close to humans again, to just being together. And last night. We had a great dinner with the team. It's just nice to be back</p>
<p>07:46</p>
<p>by the way. That was good. Yeah. That was it was quite the place. Yeah, it was great. It was a did you like the brisket.</p>
<p>07:54</p>
<p>I'm surprised I could stay awake walking home. I think I had so much brisket. Ribs is bad.</p>
<p>08:01</p>
<p>The competition here is stiff in the brisket. Because I somebody asked me You said, Hey, Scott, what brisket is better? I thought, well, how can you? It's all up here. I can't do it. I don't have that type of distinguishing palate of St. Right. Oh, okay. So smokers. Alright, so you're here at this meeting? And so what are you doing? What's</p>
<p>08:23</p>
<p>what's so I'm the, I'm the chairman of the security Working Group at the, at the IIC. So I work with a lot of great people, a lot of smart individuals with way more expertise than than me in a lot of interesting areas around security. So we work together to come up with guidance and help our membership to understand use cases that they care about around security. And, and we several times a year get together and face to face and make progress in a number of areas.</p>
<p>09:04</p>
<p>How does how does your organization how do you? How does your group handle the constantly changing environment out there? From a threat perspective from what's taking place? A we found something new over here, oh, here's some news that this wasn't good, whatever. And how do you when you bring it in? And you're saying okay, I hear you. This is how we're going to address it as an organization.</p>
<p>09:28</p>
<p>Right. You know, it's it's a constant battle, for example. We've just updated a big the, what we call the ISF, the industry, Internet of Things security framework, 150 Plus page document that goes through security and how to think about security within industrial environments. And it was originally published in 2016. And we're finally refreshing it, right so it's is taking a long time because it's been this constant challenge of trying to keep up and update it. But oh, we've got to add this other thing. Oh, we've got to add this other thing. Right. So that's updated now much more modern, which is terrific. And we hope we hope folks will take advantage of that. At the same time, we're shifting our our efforts to focus more on best practices, documents that are easier to consume that are focused on specific use cases that folks care about in in specific industries and technology use cases.</p>
<p>10:37</p>
<p>The document that you're I think you were talking about, is this the document will be finalized, I guess, for publication in the first part of January. That's right. And I can go to OMG. Say, Hey, I want to download it. That's right. There's my email address.</p>
<p>10:55</p>
<p>Well, you would go to AI Consortium. RG.</p>
<p>10:59</p>
<p>See, this is confusing, just FYI. Because it so I can I just have to know that I've got to go to ai consortium.org. Boom, find it. Download it.</p>
<p>11:12</p>
<p>Exactly. Yep.</p>
<p>11:14</p>
<p>So we have these, this document. It's up to date. I don't know how you guys. Because right when it gets published, right? There's new stuff that has to be included. There is</p>
<p>11:25</p>
<p>Yeah. But you know, this was some of the major updates to it had to do with just modernizing the way we think about computing. So originally, when this was written, we didn't include things like enough about cloud and cloud and environments or containers. IoT devices, were obviously in there. But we didn't get down to the level of depth of how all of those things work together. And so we modernized a lot of that language, we also spent a lot more time thinking about how we how we help companies to understand and how they could embed security into those devices and environments, how to onboard devices, how to manage device security, the data flows between different devices. So there's quite a bit that went into it. It's, it's, it took a long time, but I have to say it's a it's a great document and really valuable.</p>
<p>12:26</p>
<p>I see I truly can appreciate what you do, and others within IIC to truly ferret it out and create something of real value and benefit to the industrial community. I mean, cuz you guys, it's like, here's a point, but you guys debate it. And you bring in all of that knowledge that you guys all have from your work your business, and be able to hone that I just think it's a fabulous document. Now when we start talking about best practice, what does that mean? You said, Beck's best practice document or whatever? Like, Hi, I'm in manufacturing, I could just sort of pull that off of I consortium.org.</p>
<p>13:09</p>
<p>Yeah, exactly. We can you know that you can think of it as several documents that all work together. On the one hand, you have the industry, internet, reference architecture, kind of looking holistically at an overall architecture for for industrial technologies. And then you have the ISF that treat security and how you should think about security, the best practices, documents for security, focus on specific things like how should I think about endpoint IoT endpoint security? How do I think about device onboarding? And huge right, and, and, you know, how do I embed security onto a device that's, that's brand new that I'm creating, right? And organizations can figure that out on their own. But what this does is it provides them with a way to more quickly get started to, to do what they need to do. And to know that this is based on best practices.</p>
<p>14:10</p>
<p>See, it's always from what I hear is that it's always a people equation, because this is what happens out in the field. I want to digitize that asset. I got a device right there, right. I just bought this device. And they're making it so easy to sort of connect now. Right? Here's a magnet I just stick it on that motor, I'm good to go. But nobody, it despite a go. And this starts spitting data, right? Hey, check it out. Realize that that's could be compromised. Right. Exactly. And I love the fact that you do that. And that's just a change in the theory because,</p>
<p>14:48</p>
<p>well, you know, we're trying to make it easier for device manufacturers to do the right thing. Right. And oftentimes, they're so focused on delivering a product that does In a certain thing, they're focused more on the features, and the security gets bolted on later. Well, what the IIC is doing is creating, creating documents and guidance that just make it much easier for these developers, device developers, OEMs industrial operators, to just implement security the way it needs to be implemented to keep their operation, you bring</p>
<p>15:23</p>
<p>up a good point. And that point is one. It's not just me operations guy that recognizes the necessity. By the way, that guy was really kind and he's walking by real quietly. Anyway, that recognizes the necessity to secure the environment. And I want to do it right. That's one that's me, operations guy. But then you're also allowing for the developers of these devices that add value, but also be able to have that conversation. Hey, you got to bake it. And you got to do this. Yeah, there's some there's some best practices around that too.</p>
<p>16:00</p>
<p>Right. Right. It's a real ecosystem. It is play, right? Because you have the device manufacturers, you have the operators. And then you have all of the other participants within the ecosystem could be service providers. So for example, if you think about Evie, charging, right, everyone's got an electric car, let's say driving all over the place, right? Well, now you need to charge them. So how does that work, you have an Eevee charging station. Those Evie charging stations have purpose built. Filling, basically, you know, device to connect to your car, it's got all the technology inside, you have a service provider, that's going to be billing you for for for that, that power, for the recharge, and then you have the automobile manufacturers, and all of the technology within the automobile. So all of that has to work together from a security perspective. So that you know that the owner, the car, the the owner of the of that station, charging station, and the service provider, that is billing, you all can trust each other. Right? So that's, that's where documents like what we put together, help the industry to get there faster so that they can monetize whatever business they're trying to monetize, you</p>
<p>17:28</p>
<p>find possibly that the world is not getting the world is getting far more complex. Oh, yeah, it's just do you find people just saying I just there's no, I know that this is happening in manufacturing, where it's like, Hey, I gotta go down this road, if I want to make this manufacturing facility better, but I just don't I just not into it. It's just too complex. And it's, it's next level stuff. And then it's like the learning curve is upside down. And it's not even a curve, it's upside down. So there's like a high,</p>
<p>18:00</p>
<p>you know, I think people could, and it's kind of like, you know, some some sort of great story that's been written, right? Which is, okay, I'm just bouncing along, going along. And then something happens, oh, I've got to do this thing, right. But it becomes so complex. So the story ends up being about, okay, what do they do from that point? Do they say it's too complex and shy away? Or do they keep going? Or do they fix the problem? I think what what we see happening far too often is they don't shy away from the complexity, but they avoid it. Oh, that's interesting, right? They focus on, hey, let's just get it done. And let's make it work.</p>
<p>18:44</p>
<p>That's probably the conversation I would have. It's like, LP. Let me I'm at 30,000 feet and it looks like and needed to get it done.</p>
<p>18:51</p>
<p>Right. Exactly. So that's and when it comes to security. That is what we're trying to help avoid. We want to simplify it and make it easy so that more companies can adopt best practice.</p>
<p>19:04</p>
<p>I think you've just touched on something that if you if you can make it approachable, simple, you know, and I'm not I'm not expelling so much of my gray matter calories to try to figure it out. And I think that that's that's key, right? It's not a it's not a slap or slide on people but you guys are smart. And it's hard sometimes to bring it to my level where I can understand it and scratch my head and understand the noodle and</p>
<p>19:32</p>
<p>yeah, I mean, you know, when you get down into the weeds, it all becomes more more you have acronyms C of acronyms. But if you live in the sea, we're trying to make it just a little bit more bearable.</p>
<p>19:47</p>
<p>You never disappoint. So, how do people get a hold of you there? Yeah,</p>
<p>19:54</p>
<p>they can reach me at K cane det KCA i n d c At Fairlawn tech.com or just visit us at Farrell on tech.com.</p>
<p>20:05</p>
<p>I got his car here. So all of his contact information will be out on industrial talk because I like to backlink everything now. That's what I do.</p>
<p>20:13</p>
<p>So great. So great to see you again.</p>
<p>20:16</p>
<p>It was right I was so excited. There he is the legend just walked on by man so giddy with my life is so small because I have a lot of trading cards with your face and others. It's like y'all Yeah, kale. You know, that's my pathetic alright listeners. That's Keao reach out to him. Industrial talk is where his contact information of course, you're out there on LinkedIn.</p>
<p>20:42</p>
<p>Absolutely. Yeah. Up on LinkedIn. Yeah. Always a pleasure, Scott.</p>
<p>20:46</p>
<p>Always without a doubt. All right, listeners, we're gonna wrap it up on their side. Stay tuned, we will be right back.</p>
<p>20:52</p>
<p>You're listening to the industrial talk Podcast Network.</p>
<p>20:57</p>
<p>Always a pleasure to hang out with Keao out he brings the insights, he brings the skills mad skills around cybersecurity and insights and what in this digital transformation, you need to reach out to trusted individuals k out, definitely put that one up at the top of the list. Farallon is the company, his stat card out on industry or LinkedIn is absolutely spectacular, you will not be disappointed. I'm pointing at it right now. Now also, he mentioned up now a report a a standard that has been submitted particularly this, this month, go out to OMG find it, get more information. And the reality is, is that if you're in industry, industry, period, I don't care where you're at in industry, you need to be mindful of cybersecurity, that has to be up front and you need once again, connect with people ik out. I mean, it's so important because we want you to succeed, we don't want you to get frustrated, and what is being offered through paralon as well as OMG exceptional standards, a great place to start on your cyber security journey. All right, we're gonna have a lot more conversation coming from this, this meeting this OMG meeting, and I'm telling you, it's gonna blow your mind it again, I'm always dazzled by the conversations at these events. So thank you for joining. Thank you for your support. It's going to be a great year. We're going to be back. Hang tight. Another great conversation shortly.</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/keao-caindec-farallontech/">Keao Caindec with Farallon Technology Group</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://industrialtalk.com/episodes/keao-caindec-farallontech/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://podcasts.captivate.fm/media/3c8e2293-4e30-475d-9cf2-6099e784e5dc/Keao-Caindec-Mp3.mp3" length="32481647" type="audio/mpeg" />

			</item>
		<item>
		<title>Jon Clay with Trend Micro</title>
		<link>https://industrialtalk.com/episodes/jon-clay-trendmicro-5ds/</link>
					<comments>https://industrialtalk.com/episodes/jon-clay-trendmicro-5ds/#respond</comments>
		
		<dc:creator><![CDATA[Scott MacKenzie]]></dc:creator>
		<pubDate>Wed, 02 Nov 2022 15:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://industrialtalk.com/captivate-podcast/jon-clay-with-trendmicro-5ds</guid>

					<description><![CDATA[<p>On this week's Industrial Talk we're talking to Jon Clay, VP of Threat Intelligence with Trend Micro about "5 'D's' of Cyber Security".  Get the answers to your "Cybersecurity" questions along with Jon's unique insight on the “How” on this Industrial Talk interview!</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/jon-clay-trendmicro-5ds/">Jon Clay with Trend Micro</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="cfm-player-iframe" style="width: 100%; height: 170px; margin-bottom: 20px; border-radius: 10px; overflow:hidden; border: 1px solid #d6d6d6;"><iframe style="width: 100%; height: 170px;" frameborder="no" scrolling="no" seamless allow="autoplay" src="https://player.captivate.fm/a18c7b15-73d2-4860-90cf-e46db61b5851"></iframe></div><p>On this week's <strong><em>Industrial Talk </em></strong>we're talking to <strong>Jon Clay</strong><strong>, </strong>VP of Threat Intelligence with Trend Micro about <b>&#8220;5 &#8216;D's' of Cyber Security&#8221;</b>.  Get the answers to your &#8220;Cybersecurity&#8221; questions along with Jon's unique insight on the “How” on this Industrial Talk interview!</p>
<p>Finally, get your exclusive free access to the <a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener noreferrer">Industrial Academy</a> and a series on “<a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener noreferrer"><strong>Why You Need To Podcast</strong></a>” for Greater Success in 2022. All links designed for keeping you current in this rapidly changing Industrial Market. Learn! Grow! Enjoy!</p>
<h2>JON CLAY'S CONTACT INFORMATION:</h2>
<p><strong>Personal LinkedIn: </strong><a href="https://www.linkedin.com/in/jon-clay-0880512/" target="_blank" rel="noopener">https://www.linkedin.com/in/jon-clay-0880512/</a></p>
<p><strong>Company LinkedIn: </strong><a href="https://www.linkedin.com/company/trend-micro/" target="_blank" rel="noopener">https://www.linkedin.com/company/trend-micro/</a></p>
<p><strong>Company Website: </strong><a href="https://www.trendmicro.com/en_us/business.html" target="_blank" rel="noopener">https://www.trendmicro.com/en_us/business.html</a></p>
<h2>PODCAST VIDEO:</h2>
<p><iframe loading="lazy" title="Jon Clay with Trend Micro and the 5 D&#039;s to Cyber Security" width="500" height="281" src="https://www.youtube.com/embed/ftn2e6JR_gY?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<h2>THE STRATEGIC REASON &#8220;WHY YOU NEED TO PODCAST&#8221;:</h2>
<p><a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-content/uploads/2020/02/Why-you-need-to-Podcast-Graphic-2.png" width="1024" height="538" /></a></p>
<h2>OTHER GREAT INDUSTRIAL RESOURCES:</h2>
<p><strong>NEOM</strong>:  <a href="https://www.neom.com/en-us" target="_blank" rel="noopener noreferrer">https://www.neom.com/en-us</a></p>
<p><strong>Hitachi Vantara:</strong> <a href="https://www.hitachivantara.com/en-us/home.html" target="_blank" rel="noopener noreferrer">https://www.hitachivantara.com/en-us/home.html</a></p>
<p><strong>Industrial Marketing Solutions:</strong>  <a href="https://industrialtalk.com/industrial-marketing/" target="_blank" rel="noopener noreferrer">https://industrialtalk.com/industrial-marketing/</a></p>
<p><strong>Industrial Academy:</strong> <a href="https://industrialtalk.com/industrial-academy/" target="_blank" rel="noopener noreferrer">https://industrialtalk.com/industrial-academy/</a></p>
<p><strong>Industrial Dojo:</strong> <a href="https://industrialtalk.com/industrial_dojo/" target="_blank" rel="noopener noreferrer">https://industrialtalk.com/industrial_dojo/</a></p>
<p><strong>We the 15:</strong><a href="https://www.wethe15.org/" target="_blank" rel="noopener"> https://www.wethe15.org/</a></p>
<h2>YOUR INDUSTRIAL DIGITAL TOOLBOX:</h2>
<p><strong>LifterLMS:</strong> Get One Month Free for $1 – <a href="https://lifterlms.com/" target="_blank" rel="noopener noreferrer">https://lifterlms.com/</a></p>
<p><strong>Active Campaign:</strong> <a href="https://www.activecampaign.com/?_r=H855VEPU" target="_blank" rel="noopener noreferrer">Active Campaign Link</a></p>
<p><strong>Social Jukebox:</strong> <a href="https://www.socialjukebox.com/" target="_blank" rel="noopener noreferrer">https://www.socialjukebox.com/</a></p>
<h2>Industrial Academy (One Month Free Access And One Free License For Future Industrial Leader):</h2>
<p><a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-admin/wp-content/uploads/2019/10/Industrial-Academy-Graphic.png" width="1024" height="538" /></a></p>
<h2>Business Beatitude the Book</h2>
<p><img loading="lazy" decoding="async" class="alignleft" src="https://industrialtalk.com/wp-content/uploads/2019/10/BB-Book-Cover.png" width="138" height="215" /></p>
<p class="ql-align-center">Do you desire a more joy-filled, deeply-enduring sense of accomplishment and success? Live your business the way you want to live with the BUSINESS BEATITUDES&#8230;The Bridge connecting sacrifice to success. <strong>YOU NEED THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><strong>TAP INTO YOUR INDUSTRIAL SOUL, RESERVE YOUR COPY NOW! BE BOLD. BE BRAVE. DARE GREATLY AND CHANGE THE WORLD. GET THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><a href="https://industrialtalk.com/business-beatitude-reserve/" target="_blank" rel="noopener noreferrer"> Reserve My Copy and My 25% Discount</a></p>
<h2>PODCAST TRANSCRIPT:</h2>
<p><strong>SUMMARY KEYWORDS</strong></p>
<p>scott, industry, cybersecurity, industrial, people, trend micro, cyber, Jon, conversation, network, target, companies, business, ot, world, digital transformation, educate, area, manufacturer, trend</p>
<p>00:04</p>
<p>Welcome to the industrial talk podcast with Scott Mackenzie. Scott is a passionate industry professional dedicated to transferring cutting edge industry focused innovations and trends while highlighting the men and women who keep the world moving. So put on your hard hat, grab your work boots,</p>
<p>00:21</p>
<p>and let's get all right. Once again, thank you very much for joining industrial talk in really thank you very much for your support. This platform is completely and fully dedicated to your success. Because you're bold, you're brave, you're daring greatly you solve problems, you collaborate. You're making the world a better place. I say that all the time, but I believe in in my heart. All right in the hot seat, Jon Clay, he is the VP of threat intelligence at Trend Micro, and it is a barnburner conversation. You need to listen to it because it's all around cybersecurity. But Jon never disappoints. Let's get cracking with the conversation. Is we need more conversations around cybersecurity. Yes, we do. That's an important topic. If you're in the world of digitally transforming your business. Yeah, you need to, you need to focus in on cybersecurity, and I can't think of a better company than Trend Micro that will help you along with that journey. And they've been around for a long time they've seen it all. And you need it, you need to really sort of take notes. All right, a couple of points of business. One, you go out to industrial talk, which you'll have all the contact information for Jon and others. We have a series called The industrial revenue growth, I think that's what it's called. I think it is it's a series as you can say on it's hot off the press. So I needed to think more through the topic. However it is out there it is free, and it is the in Yeah, industrial revenue growth series. And we talk about, we provide an overview, just go out there, and it's easy peasy. It's on demand. It's sort of like the Netflix of industry. So we talk an overview of what we're looking at, we're also talking about that corporate strategy, why it's important. We talk about marketing, we talk about the technology. And we talk about sales. And this is all about increasing revenue and is a you know, many in the the the world of manufacturing the world of industry, we are hyper focused, which we need to be hyper focus in how we can gain and extract greater value out of that manufacturing process out of that industry out of that whatever it might be, and have that insights into, you know, your operations, because it's important, we need to take that same.</p>
<p>02:54</p>
<p>Just focus on that whole sales and revenue cycles, there are so many components and tighten that up. So we have a great conversation with Ed Marsh. And again, it's a five part series, it's on demand, you just sort of sign up and you just fire it up. If you are awake at one in the morning, and you're saying, gee, I wish I knew more about the technology that exists out there in sales. Well, you just sort of fire that up and you listen to it. That's, that's that's on demand, baby. And that's what the world we live in, in the Netflix of industry right there, we're going to have a lot more but that that's the first one because I think today more than ever, we've got to be keenly focused in surviving, and increasing revenue, and figuring out ways of doing that, and how to automate it, how to be more efficient at it. And think differently. Think outside the box right here. Industrial talk is all about that also. FABTECH. Yep, we're broadcasting from FABTECH. That is November 8, that's right around the corner, November 8, through the 10th. Atlanta, Georgia, we have a booth, we're going to be doing our industrial speed dating, which that means we just grab a camera, and we go to your booth. And we start chirping about the technology that you have there and why it's so cool, why it's so fantastic. Why it's so needed. And that's about four minutes. And then we of course, we're going to have a broadcast booth and we're going to be talking to people a little bit more extensive on why they're there or what's the technology all important. All insights into why manufacturing so cool. Now about that. But we're going to be at Fabtech so if you are at Fabtech I don't even know what booth I'm at. If you are at Fabtech you gotta you gotta look me up. Let me see. I'll have it out there on industrial talk. I can't remember it starts with an A and I think it's but but look us up and we're gonna be at that booth. We're gonna if you You got your booth there. And if you want to have a conversation, a live broadcast like we did at IMTS, or smrp, or what we're going to be doing over in Barcelona, yeah, you need to look us up and have that conversation. All right, let's get on with with the chat. Jon Clay threat intelligence. And I want to make sure you understand, we got to have more of these conversations. We've got to have that cyber conversation and and help everybody to succeed in this world, especially the digital transformation. And so this is why this conversation is so cool. And Jon, never I mean, he doesn't and we go to the same barber. So, you know, he's got to be cool. And he's good looking just like me, just good looking bald, good looking. But anyway, he doesn't disappoint and he definitely knows what's going on. So enjoy the conversation with Jon. Jon, welcome back to industrial talk. Thank you very much for that. Yeah. time in your schedule. I like having this conversation. We're gonna be Turpin. On no, we're gonna be riffing on I don't like chirping, we're gonna be riffing on cybersecurity, impact on industry, whatever comes to mind, because we can. And that's how we roll. How're you doing?</p>
<p>06:12</p>
<p>I'm great. Scott, always enjoy talking with you. We'd have a great time on these. So I look forward to this one, and maybe future ones for sure.</p>
<p>06:21</p>
<p>Oh, you better got it. And if you're on video, you'll notice that we look the same. I just have a beer, just just look for Scott with the beer. That's me. That day. And there. Yeah.</p>
<p>06:32</p>
<p>It's creepy. Taking off my disguise.</p>
<p>06:35</p>
<p>That is Oh, my gosh, it's Jon J. O N. So anyway, thank you very much again, I really appreciate it. And I think that, given all the conferences that I've been to, and all of the individuals and industries that I've spoken with, there is, again, the topic of cybersecurity, we want to go down this road of digitally transform, automate whatever it is to try to be more efficient. But that that, in essence, is a recipe for, you know, vulnerability from a from a cyber perspective penetration. If you're not, if you're not just sort of thinking about it, you're just like going down the road. So with that said, I think that it would be great to sort of see where we're at today, where it's going, that just sort of do that. So with that said, What do you see in some of the trends that are taking place within industry?</p>
<p>07:33</p>
<p>Yeah, I mean, well, we certainly are moving into industry for Dotto, right, which is a more connected industry more, everything is going to be connected devices connected, your manufacturing lines will be connected, you know whether your ot network is connecting to your IT network these days, because it's makes it a lot easier and more manageable for the organization. Right? If you can do remote monitoring, remote maintenance, all of that makes things much easier for the business to run their, their, their organization or run their their lines. So I think you know, as we move forward, Scott, I was in fact, I was on a talk earlier today, we were talking about 2030. So we're talking future stuff, somebody thinks I'm a futurist for some reason, and got me on this thing. But man, you know, you can see cyber physical coming into play, right? Where you're gonna have stuff embedded in your bodies, and then you're you're automating the plants and everything. So the challenge, obviously, Scott is what that ends up doing, as we've seen in the history is that the attack surface just grows more and more and more, right. So as new technologies come into play, that's a whole new attack surface for these bad guys out there that can take advantage of them and exploit them. So you know, the what we need to do, though, obviously, as as we are building these new devices, building this new technology and capability, we always got to have in the back of our mind, what are the risks associated with it if a bad person or a malicious actor or a nation state actor group gets access to it.</p>
<p>09:20</p>
<p>But outside of the fact that every time I have a conversation with you, I don't want to leave my office and I want to curl up just because you keep pointing out some really interesting, like, new attack surface. That's a new term for me, which makes complete sense. I have a wonderful word picture in my head about that. The other thing is when you start talking about as we become more connected, like you, you spoke about people becoming more connected, right? Ah, and yeah, I don't want to be hacked personally. But what</p>
<p>09:55</p>
<p>really does I mean, if you think also about it, Scott, you know, we're going into a global recession and one of the one of the aspects of a global recession is usually you decrease headcount, unfortunately right for those people, but you know, what we're starting to see is a lot of these businesses are starting to automate, and they're putting in robots, and they're putting, you know, you've been to all these shows, yeah, you're probably seeing these robotics that have improved, obviously, over the years, and they're going to continue to do improve. You know, Elon Musk had his robot on stage and walking and everything. So I think, you know, that's going to be obviously an area that goes, moves forward. But, but the nice thing also is people say, Well, they're going to take our jobs. But the reality is that you're going to have other types of jobs that come into play for the humans, you're always going to have to have technicians, they're going to have to go and fix those robots, when they break, reprogram the, the robots, all of that is going to build. And in fact, I think it actually increases people's ability to grow their themselves and grow their incomes, because these are higher paying jobs. And typically, that you get that that where they're replacing some of the more unskilled labor types. Yeah,</p>
<p>11:10</p>
<p>it was always interesting, when I have those conversations, you're absolutely spot on. I agree with you. 100%. I wish I was younger, because I mean, really, it's it the world is your oyster, if you can, can repair this automation in some way, shape, or form, make it more efficient, whatever and be engaged. Your the, your career is bright, because it's happening. How do you address the vulnerability of all of this connected? You know, machines, like we, we briefly touched upon CNC machines, their every bed is connected, and they're getting more connected? How do we, how do we create a workforce that's constantly learning and educated? Because the majority of us, me included, will always gravitate to the shiny will always gravitate to something, but I don't think about the vulnerability side, how do you sort of bring that into light?</p>
<p>12:08</p>
<p>Yeah, I think the first step Scott is really to understand what could happen, right? So we talked about earlier, I said, you know, you got to understand that these nation, state actors or, or malicious actors will target these ot networks and industrial controls, because there's there the motives, obviously a change. So there's a couple of things that that we hear about, right? Is what are they? What's their goal and game of, of targeting these things. So a couple of areas, we talked about five DS, right? So it's disrupt, disable, deny, deceive, and or destroy.</p>
<p>12:50</p>
<p>So that's</p>
<p>12:51</p>
<p>what you got to start thinking about when when you have an OT network, or ICS devices or robots, whatever it might be, you have to start thinking about what of which one of those DS could potentially target me, right. So if it's disruption, for example, it's probably some kind of a extortion type of attack because I want to disrupt your process. And if I can disrupt that process and bring it down, and you can't run your business, and they ask you, Hey, you know, give us $10 million to get it back and running. You may be interested in paying that deny if I want to deny access to something again it depends on the motive and who's targeting many cases it's you know, nation states for example, you're probably going to see more of that deny and or destroy activities from nation states then you're going to see disrupt disruption and disabling usually is going to be in context with the revenue people you know people that want profit whereas deceived destroy deny are going to be more likely more nation states that are wanting to do more harm.</p>
<p>14:04</p>
<p>Yeah, I'm writing all this down just because I want to get the five days in now in no particular order I was writing hanging on every word disrupt a night destroy, disable, deceive. Whatever</p>
<p>14:19</p>
<p>crazy. Yeah, I mean, and so you know, once they, they decide who they want to target then the next step comes into play is to start collecting intelligence about those different systems and what is at play and there's a couple of things that these actors can do there. There's a lot of open source research I mean, you as you know, Scott, a lot of the vendors of these devices out there they put their, their user guides and everything online so you can learn about you know, how to do things how to change the configuration just by reading the the instruction manuals that are all in open source out there. You also, you know, we're starting to see more insider threats. So you the actors are recruiting insiders, disgruntled employees, malicious employees, they're even hiring people into the business that whose sole purpose is to do malicious activities. So they get a job inside the company. And then the other area that can gather intelligence is from the enterprise network itself. So if I target the IT network, I can go in there and you know, all these companies have, have documentation about their processes about their, what products they're using, all of that is going to be in data inside the corporate network. And so they can go in and steal that information. And then, and then obviously, they do their education at that point and figure out what to do. How do you</p>
<p>15:45</p>
<p>how do you keep ahead of all of this, I know if I was a, just a mom and pop manufacturer, small to mid size, whatever it might be? How does How do I keep ahead of this? What's What's the practical steps because, hey, I want to be more efficient. I want to take advantage of this industry for Dotto digital transformation. Juggernaut, what? What is your recommendation? How do you help? I mean, yeah, start out No, no, yeah,</p>
<p>16:19</p>
<p>yeah, education, obviously, is the first step. The good news is I think Sisa and some of the US government agencies that put out a lot of good information about protecting ICs and OT networks. And you can go to private industry, like Trend Micro, for example, we do a lot of education, we just, we talked CNC, right, we just published a research paper on CNC, which is computer numerical control devices, right? And all the different information, we've got videos on the landing page that you can follow and listen to if you don't want to read the whole report, that we even show attacks targeting a CNC device. So you know, that's so education is probably first and foremost, the second step Scott is</p>
<p>17:04</p>
<p>but I'm gonna interrupt real quick. Yeah. I'm just telling you right now, the education that's available out there. For me, it goes right over my head. That's one, two. I'll fall asleep. So I try I fall asleep. Is there a way of being able to educate on this topic that can be consumed by me, Joe sixpack?</p>
<p>17:31</p>
<p>Yeah, I mean, Scott, that's, that is one of the challenges, obviously. And, you know, you might look at YouTube, because there's a lot of people that do webinars, and they post that stuff on, on YouTube, and you might try to find, you know, OT, attack 101 type content that can give you some of the, you know, somebody will, obviously is probably already put it out there some of the just generalized information that, you know, but then you'd probably at some point, you want to call in experts, you know, consultants or vendors that can help you.</p>
<p>18:08</p>
<p>And then that brings about another thing that just okay, I'm already stressed because you use multi syllable words, in this doc on, you know, cyber world, right. That's one. And a lot of this stuff is, so I'm already stressed there. But I know it's important. I gotta find somebody to trust. I mean, there's a lot of shingle people out there saying, Hey, we're in the cyber sphere. Well, we'll protect that. Yeah. And and I'm not trying to impute anybody, but there's,</p>
<p>18:38</p>
<p>well, one of the things somebody had, yeah, one of the challenges we've had Scott, take an example the cloud, cloud infrastructure, right? So Amazon and Microsoft Azure, AWS Azure, that has come on strong over the last number of years, right. And one of the first things that we found out very early on is that you can't take traditional cybersecurity products and just uplift them into that environment and think they're going to work you we actually had to develop and build native controls for that environment. And I think the same thing we're starting to see happening in the OT ICS you know, area because organizations are they already have some of this cybersecurity stuff and they think, Oh, we can just drop it in to an OT network and it'll be fine. Not a chance. It's a unique environment that requires specialized tools. Just like you know, these these manufacturers there they have to use specialized tools for a lot of what they do. The same is true with software and the same is true with with cybersecurity, you do need some specialized tools. So I think and that's where again, it gets a little challenging especially for a mom and pop who probably don't have the the knowledge nor the the skill set nor the probably been Ajit, to deal with this. And that's where I start talking about more on the MSP managed service provider type of model where you actually hire a company and they manage everything for you, they implement it, they, they monitor it for you, they take the actions for you, and you just your job is to run your business, not run your cybersecurity. And that's, and that's where I think we're going to be seeing in the future, some more growth areas. Because again, these companies just don't have the skills and the knowledge and the budget to to manage it all themselves. And so you bring in the experts, and let them do and</p>
<p>20:41</p>
<p>see I like that, that that approach. And I think that many companies in multiple areas that have to sort of address that managed model, because if I'm a manufacturer, and and I have to maintain my assets, but I don't have people on board, there are companies that can provide that ability to maintain those assets, the same thing can exist within the cyber area. And I think that that, like a specialist like yeah, okay, well go here. You're just, again, it, are there. Are there standards, let's say if I if I'm an MSP whatever, right. And I provide that security capability. But how would I go about evaluating the quality of that? Organization?</p>
<p>21:33</p>
<p>Yeah, that's a good question. Scott, I, you know, unfortunately, there's no like UL rating. Or for these firms, you can, obviously, you can go and look at data from some of the third parties that may, and put out information. So like Gartner, for example, has a lot of their, their, their quadrant, different areas, there might be one for MSPs. And you can see who's in the top quadrant. The challenge with that is a lot of MSPs are small mom and pop shops, they're actually small businesses in supporting the local economy, the local business set, and so you kind of you're probably going to have to go and do some due diligence in terms of finding those, those local ones. But then there are some, definitely some, some bigger vendors in this space that do more of a regional and then maybe even a country level aspect. But those tend to be a little bit pricier and maybe a little bit more challenging, I think to work with. But they also though, are probably more sophisticated in their controls. And they can they can they have the the people and technology that is that is needed to deal with this. But But again, you know, maybe start small and then work your way up if you don't find what you want. Yeah,</p>
<p>22:53</p>
<p>if I was manufacturer, I, I would try. Just, I'm thinking through it, because why not? I might as well put that hat on, I would want to get a baseline, right, as much as I don't want to see it. Right. I would want to get sort of a general overview of that quality of my security layer or whatever it might be, and be able to sort of have that clarity. So then I can sort of think through an avenue to achieve it. But the agree is like whether you like it or not. And I That's a tough one. But you do need to have that insights into your, your network.</p>
<p>23:35</p>
<p>Yeah, yeah. And I mean, we're starting to see regulations coming out, you're starting to see a number of policies that are coming out of the US government, for example, in this space. So a lot of those are tied to US government networks and stuff. And they're not been applied out to the private industry yet. But you'll probably start seeing that happening. So again, educating yourself and looking at some of those controls that that the US government is putting in place might be a good idea to start bringing into your business early. Because if you don't, you might get caught off guard when some law or something comes in or regulations comes into play.</p>
<p>24:14</p>
<p>So I'm out on your website, trend micro.com. Of course, she sent me the link to that CNC, which is</p>
<p>24:23</p>
<p>gathered, and you should see our research button at the top. And if you do that pull down. That's where all of our research is. And we do tons of research on industrial IoT we've had over the years, we've done stuff on cranes, we've done stuff on agriculture, and you know, the the devices used in those places. It's so this is massive amounts. Yeah. And</p>
<p>24:49</p>
<p>so from my perspective, I could go to Trend Micro I can route around, I can do the little drop down on my mind and I could see the resources. It's all there. And I can just begin that journey and or do a little, do a little search and then find maybe some targeted content. Yeah, exactly. You know, exactly. Because I, you know, I don't, we can't make it hard to find the information, we can't make it difficult to understand the information. And if you make it in such a way that people are saying, Oh, I see the picture, I'm painting that picture in my head, I could go the next level, right? It's, it's a, it's a journey in that sense. And then realize that there's gonna be a point where saying, Okay, I'm, I'm educated. Now I gotta find somebody to collaborate with trust, to be able to. But if you're the realities, if you're in the digital transformation, you see the value, you pull in data off of equipment to try to improve the quality, whatever, whatever that strategy is. That's all about being connected. And that is all about how do you protect yourself from nefarious behavior? All right, listeners, we're going to wrap it up, we've got five DS out there. We've got some strategies around who they want to target. And I think, from my perspective, from a simple perspective, I think that file, go to trend micro.com and find out some research, there's a great place to educate. I think that that's, I think the parting shot, is you're not alone. There's some good trusted people out there companies resources, and it's all there. And you have to whether you like it or not, you have to do it, you have to figure it out. Or</p>
<p>26:37</p>
<p>yeah, like, you know, Scott, you know, try Mike are we formed a company called TX one sole purpose is to look into the it ot ICS areas, and figure out how to protect them. And so they're already producing products that are very simple and easy to use, and can help an organization out there. So, you know, we we continually invest in innovation and continually invest in people and technology. So like you said, they're not in it. For themselves, or by themselves. They have trusted partners. Yeah.</p>
<p>27:13</p>
<p>Yeah. Yeah, see, and I do like that. And he, granted, I mean, Trend Micro, you better be in it, you better continue to sort of research because it doesn't stop out there.</p>
<p>27:25</p>
<p>Now, we've been in 34 years, Scott, and will continue for the next 34 years. And one thing we know we dedicate ourselves just on security, cybersecurity, we don't buy other companies that aren't in in cybersecurity, like some of our peers have done, but we'll continue to do and fight the good fight out there and try to keep the attackers out of your networks.</p>
<p>27:48</p>
<p>Like that. That's a noble cause I do I really, I really appreciate what you guys are doing. And, and because I'm, I'm all into the innovation and the technology and how that is going to help us be better manufacturers or industry, whatever it might be. But the reality is, it's it's gotta we got to protect it. We got to we got to make it frustrating to penetrate those. OT</p>
<p>28:12</p>
<p>Exactly. All right, God, it was a joy. I enjoyed the calculation. Let's do it again.</p>
<p>28:18</p>
<p>Pick Yeah, man, Jon. That's Jon. Trend. Micro is a company we're talking about. A lot of cyber stuff, you're gonna have all the contact information for Jon as well as the five days of fear night, it'll be out on industrial talk.com. We're gonna wrap it up on the other side. Thanks very much for joining. We will be right back.</p>
<p>28:35</p>
<p>You're listening to the industrial talk Podcast Network.</p>
<p>28:41</p>
<p>All right. Once again, thank you very much for joining industrial talk. And boy, I'll tell you, I really like talking to Jon. He knows his cyber stuff out there. And again, Trend Micro and teen Trend Micro fingers on the pulse if you're in the digital transformation game, which you should be because everybody else is. And if you're not, you better look into that. You need to secure that network. And I'm telling you right now you need to reach out to Jon or team Trend Micro amp, then you can navigate those waters, get the answers you need. Go out to industrial talk, all the contact information. Don't come chirpin to me and say I can't get a hold of Jon. You can't. And you must and have that conversation. It's painless. Come on. It's painless. All right. We have that sort of Netflix approach to industry education. And we're all about making you succeed or figuring out ways of making you succeed, and giving you the information to to be able to do that. And so we have that industrial revenue growth series, there's going to be more and this is with a great, great professional called Ed Marsh. And we have some handouts out there. We've got stuff that you could just start getting engaged in sort of taking an assessment of your business And then figuring out a roadmap so that you can ensure some some, you know, resiliency in the future. That's right. Go out industrial talk, click on it. Yes, I have to ask for your email. Because if you want to watch it at 235 in the morning, for whatever reason, you can. There you go, I need it. I need to send that email link to you. That's it. Nothing fancy. Nothing. Nothing too big. All right. Go out. Buy more. All right. Hang out with Jon. You know, I always say this. Be bold, be brave, dare greatly. Jon is somebody you need to hang out with, because you're gonna change the world. We need you to change the world. We need you to be successful. Thank you very much for joining industrial talk. And as you know, we're going to have another great conversation of another professional right around the corner so stay tuned. We will be always there for you</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/jon-clay-trendmicro-5ds/">Jon Clay with Trend Micro</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://industrialtalk.com/episodes/jon-clay-trendmicro-5ds/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://podcasts.captivate.fm/media/ac062f75-2681-4725-9f65-9a53909a0df6/Jon-20trend-20micro.Mp3" length="44439407" type="audio/mpeg" />

			</item>
		<item>
		<title>Bill Hoffman, Chairman and CEO of OMG</title>
		<link>https://industrialtalk.com/episodes/bill-hoffman-omg/</link>
					<comments>https://industrialtalk.com/episodes/bill-hoffman-omg/#respond</comments>
		
		<dc:creator><![CDATA[Scott MacKenzie]]></dc:creator>
		<pubDate>Wed, 27 Jul 2022 15:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://industrialtalk.com/captivate-podcast/bill-hoffman-omg</guid>

					<description><![CDATA[<p>On this week's Industrial Talk we're onsite at IoT Solutions World Congress and talking to Bill Hoffman, Chairman and CEO with OMG.Org about "Collaborating with leaders to solve today's industrial challenges".  Get the answers to your "Industry Standards" questions along with Bill's unique insight on the “How” on this Industrial Talk interview!</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/bill-hoffman-omg/">Bill Hoffman, Chairman and CEO of OMG</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="cfm-player-iframe" style="width: 100%; height: 170px; margin-bottom: 20px; border-radius: 10px; overflow:hidden; border: 1px solid #d6d6d6;"><iframe style="width: 100%; height: 170px;" frameborder="no" scrolling="no" seamless allow="autoplay" src="https://player.captivate.fm/54099524-e027-4d12-af8e-9ea32c043251"></iframe></div><p>On this week's <strong><em>Industrial Talk </em></strong>we're onsite at <a href="https://www.iotsworldcongress.com/" target="_blank" rel="noopener">IoT Solutions World Congress</a> and talking to <strong>Bill Hoffman, Chairman and CEO</strong> with OMG.Org about <b>&#8220;Collaborating with leaders to solve today's industrial challenges&#8221;</b>.  Get the answers to your &#8220;Industry Standards&#8221; questions along with Bill's unique insight on the “How” on this Industrial Talk interview!</p>
<p>Finally, get your exclusive free access to the <a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener noreferrer">Industrial Academy</a> and a series on “<a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener noreferrer"><strong>Why You Need To Podcast</strong></a>” for Greater Success in 2022. All links designed for keeping you current in this rapidly changing Industrial Market. Learn! Grow! Enjoy!</p>
<h2>BILL HOFFMAN'S CONTACT INFORMATION:</h2>
<p><strong>Personal LinkedIn: </strong><a href="https://www.linkedin.com/in/williamhoffmanomg/" target="_blank" rel="noopener">https://www.linkedin.com/in/williamhoffmanomg/</a></p>
<p><strong>Company LinkedIn: </strong><a href="https://www.linkedin.com/company/omg/" target="_blank" rel="noopener">https://www.linkedin.com/company/omg/</a></p>
<p><strong>Company Website: </strong><a href="https://www.omg.org/" target="_blank" rel="noopener">https://www.omg.org/</a></p>
<h2>PODCAST VIDEO:</h2>
<p><iframe loading="lazy" title="Bill Hoffman, Chairman and CEO of OMG" width="500" height="281" src="https://www.youtube.com/embed/ZghQ92XsUeM?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<h2>THE STRATEGIC REASON &#8220;WHY YOU NEED TO PODCAST&#8221;:</h2>
<p><a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-content/uploads/2020/02/Why-you-need-to-Podcast-Graphic-2.png" width="1024" height="538" /></a></p>
<h2>OTHER GREAT INDUSTRIAL RESOURCES:</h2>
<p><strong>NEOM</strong>:  <a href="https://www.neom.com/en-us" target="_blank" rel="noopener noreferrer">https://www.neom.com/en-us</a></p>
<p><strong>Hitachi Vantara:</strong> <a href="https://www.hitachivantara.com/en-us/home.html" target="_blank" rel="noopener noreferrer">https://www.hitachivantara.com/en-us/home.html</a></p>
<p><strong>Industrial Marketing Solutions:</strong>  <a href="https://industrialtalk.com/industrial-marketing/" target="_blank" rel="noopener noreferrer">https://industrialtalk.com/industrial-marketing/</a></p>
<p><strong>Industrial Academy:</strong> <a href="https://industrialtalk.com/industrial-academy/" target="_blank" rel="noopener noreferrer">https://industrialtalk.com/industrial-academy/</a></p>
<p><strong>Industrial Dojo:</strong> <a href="https://industrialtalk.com/industrial_dojo/" target="_blank" rel="noopener noreferrer">https://industrialtalk.com/industrial_dojo/</a></p>
<p><strong>We the 15:</strong><a href="https://www.wethe15.org/" target="_blank" rel="noopener"> https://www.wethe15.org/</a></p>
<h2>YOUR INDUSTRIAL DIGITAL TOOLBOX:</h2>
<p><strong>LifterLMS:</strong> Get One Month Free for $1 – <a href="https://lifterlms.com/" target="_blank" rel="noopener noreferrer">https://lifterlms.com/</a></p>
<p><strong>Active Campaign:</strong> <a href="https://www.activecampaign.com/?_r=H855VEPU" target="_blank" rel="noopener noreferrer">Active Campaign Link</a></p>
<p><strong>Social Jukebox:</strong> <a href="https://www.socialjukebox.com/" target="_blank" rel="noopener noreferrer">https://www.socialjukebox.com/</a></p>
<h2>Industrial Academy (One Month Free Access And One Free License For Future Industrial Leader):</h2>
<p><a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-admin/wp-content/uploads/2019/10/Industrial-Academy-Graphic.png" width="1024" height="538" /></a></p>
<h2>Business Beatitude the Book</h2>
<p><img loading="lazy" decoding="async" class="alignleft" src="https://industrialtalk.com/wp-content/uploads/2019/10/BB-Book-Cover.png" width="138" height="215" /></p>
<p class="ql-align-center">Do you desire a more joy-filled, deeply-enduring sense of accomplishment and success? Live your business the way you want to live with the BUSINESS BEATITUDES&#8230;The Bridge connecting sacrifice to success. <strong>YOU NEED THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><strong>TAP INTO YOUR INDUSTRIAL SOUL, RESERVE YOUR COPY NOW! BE BOLD. BE BRAVE. DARE GREATLY AND CHANGE THE WORLD. GET THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><a href="https://industrialtalk.com/business-beatitude-reserve/" target="_blank" rel="noopener noreferrer"> Reserve My Copy and My 25% Discount</a></p>
<h2>PODCAST TRANSCRIPT:</h2>
<p><strong>SUMMARY KEYWORDS</strong></p>
<p>people, iot, technology, standards, world, consortiums, industrial, talk, consortium, hoffman, problems, industry, digital transformation, augmented reality, companies, congress, conversation, trusted, happen, stop</p>
<p>00:00</p>
<p>Industrial Talk is brought to you by Armis. Yes, you are in the digital transformation game. Yes, you need to find trusted companies, trusted individuals to help you along with that journey. The Armis platform delivers complete asset intelligence, you know what that means, insights into your connected assets, you're in the digital transformation game, you have to have that insights into what is connected, go to armis.com find out more, you will not be disappointed. Also industry IoT Consortium. At industrial talk, we always talk about education, we always talk about collaboration, we are always talking about innovation. And if you're a business that has any desire to be resilient to the future, you need to be able to educate, collaborate, as well as innovate with other industry professionals. That's a must. Industry IoT consortium brings that all together, you need to be a part of this community, you need to be connected with these leaders that are all apart the industry IoT consortium, go out to ai consortium.org. Find out more again, you will not be disappointed. You're just going to be happy. Hey there, and welcome to industrial talk. Thank you very much for joining. We were on site at IoT solutions World Congress, Barcelona, Spain, and that is a must attend event for you to put on your calendar, incredible people, incredible companies solving problems and delivering solutions. We also had the opportunity to talk to Bill Hoffman, he is the chairman and CEO of Object Management Group. And we're talking standards. Okay, he's talking standards, but we need to have standards. And I'm telling you right now, this is a paper and pencil conversation with Bill Hoffman, enjoy it.</p>
<p>02:04</p>
<p>Bill Hoffman is in the hot seat on key is the company and he is a part of the industry IoT Consortium. Did I get that? Right? You did, Scott, because you changed it. And I had to sort of like, my brain was wired the other way. And it was, I don't know, my ears started to bleed.</p>
<p>02:21</p>
<p>Well, you know what happened? No, please tell me found out that industrial for some of the markets that are using this technology didn't resonate, particularly with doctors. So industry made more sense.</p>
<p>02:35</p>
<p>So what was funny is that when I saw that, and and different color palette, now it's blue. And then I it was rough. I just want to let you know, I was tossing to turn into No, I was I just wanted to I wanted to bring the drama. So let's, for the listeners out there. Let's let's talk a little bit about just the the Object Management Group structure to consortiums. How that lines up and then let's talk a little bit about what's going on with with these Consortium. A</p>
<p>03:09</p>
<p>sure that's great. Hey, Scott, were 33 years old. I went to work with OMG started 33. I went to work three months after it started. Both Richard soli and myself thought it was a two year gig. We had a lot more hair. Here it is.</p>
<p>03:27</p>
<p>Yeah, it had and, and and the energy is still there. Absolutely. It's absolutely you you wander around and this this, this environment this this conference, chock full of energy, absolutely passion.</p>
<p>03:41</p>
<p>And you know, we're also glad to be back. Oh, my goodness, this is my first event outside the states since COVID. And I am delighted. You know, to see people that I have talked to on Zoom calls now for two years without ever meeting in person. I didn't recognize some of it. We've had employees we've hired I've never been in terms no way really hired him virtually during the middle of COVID during lockdown.</p>
<p>04:05</p>
<p>It was weird because I had I had the same thing i i met so many people that I've met virtually and and you walk in fact, no. One walked up, Scott. Well, hey, how are you? Yeah, it but it's a good thing. And it's good to be back.</p>
<p>04:21</p>
<p>It's good to be back.</p>
<p>04:22</p>
<p>Did you get all sort of stressed out with being tested and getting on the plane and making sure that you're you do everything sort of the way it needed to be done? I was I was a little tweaked on that. Well,</p>
<p>04:33</p>
<p>I gotta go back. So same thing. I gotta have a test tomorrow so I can get back on the plane.</p>
<p>04:38</p>
<p>Again, I'm sorry to deviate here. Are you going to get at the airport? No. So you gotta you gotta please</p>
<p>04:44</p>
<p>here. I have an appointment. Downtown. I just get off stop guide.</p>
<p>04:49</p>
<p>Well, we were instructed to go to the airport and they would take care of it there. So okay, well, we'll talk offline. How's that? All right, so let's go back to the original conversation. You know, I'm GE, the consortiums that hang off a little structure.</p>
<p>05:06</p>
<p>So we started as a standards development organization. And our, our standards are ubiquitous everywhere read everything from every cell phone around the world to the International Space Station to Mayo system, Mayo Clinic, the new plastic destroyers are all running on top of bone G standards. We've done really well with standards. And then along came the industrial Internet. And that's where we started the IIC, which is now the industry IoT consortium. And obviously, that was the genesis of what brought us to this show. We met with the fewer people eight years ago. And we sketched out that, you know, we thought we needed a way to show people not just what the technology was, but how do you use it? How do you measure return on investment? What partners do you use with these things? No one company can do this alone. No one thing about all these technologies, no one company could solve all these problems. It is collaborative,</p>
<p>06:01</p>
<p>it is collaborative, it's human. And it's collaborative. Without a doubt, there's no other way the digital transformation</p>
<p>06:06</p>
<p>journey depends on multiple partners. Trusted, trusted PR, because</p>
<p>06:12</p>
<p>that's another sort of nugget of truth that comes out. It's like, yeah, I understand the need to do this. I'm a company, I understand it. Where do I start? Who do I trust? And are you going to create a lot of problems for me? So those are really this is like, you know, foundational. And that's why this is so, so important. That's</p>
<p>06:33</p>
<p>why the show did so well. You know, I have to tell you coming into this this year's event, we didn't know what to expect. Because, you know, two months ago, we weren't sure what was happening a month ago, we weren't sure what, two weeks ago, we weren't sure what was going to happen. We know that for a lot of our friends in the Asian Pacific they weren't unable to attend. We also know that a lot of our friends in the States, they can't wait to the last minute to make a trip like this. And a lot of people you know, need two months in advance notice, and they didn't have that based on the variants that were going around. So we're tickled the amount of people that have made it to this event.</p>
<p>07:07</p>
<p>It is great. And validation is there 1000s 1000s</p>
<p>07:12</p>
<p>of people here 1000s of people, but as I walk around the exhibitors will seem to be happy, the quality of the of the attendees are the right kind of people were really cool about a lot of the stuff. But what we're really hot on is that beyond IoT, and IoT, now, if you look around the show for it, you see digital twin stuff, you see artificial intelligence, you see augmented reality, you these are the areas that are emerging technologies that are going to make a big difference in these companies digital transformation journey. And we'll continue to evolve the show to reflect these technologies as they are. So</p>
<p>07:46</p>
<p>this is what I was interested in I it was an epiphany that took place and I said, You know what? IoT is just all of a sudden become this miscellaneous file, because you got digital twin, you got AI, you got cloud, you've got edge, you've gotten thinner, and you've got, you know, just as whatever it is, it's just goes on and on and on. And so IoT almost has to be redefined to a certain extent. I don't know, I'm just sort of</p>
<p>08:14</p>
<p>all these tangentially overlap. They do. They do they,</p>
<p>08:18</p>
<p>again, back back to the collaboration. You can't just you can't just be in a silo and say, Hi, I have a device and they've collapsed. And that's it. And that, you know, you find out the connectivity of it. Right. That's right. That's good. So So these, these consortiums, what, what's the thinking behind it? Well, you</p>
<p>08:35</p>
<p>have communities of people who have a vested interest in a certain technology and how to apply it to their business or their organization, in the hopes of either gaining efficiency, profitability, making it a better world. There's a variety of reasons why people are embracing these things. But the other thing is, is that you can't be left behind. You can't be the last guy to get on the bus.</p>
<p>09:00</p>
<p>That is the biggest concern no matter how, you know, there's gonna be pain. It's, it is what it is, but I'd rather deal with the pain. And then or Wait, you can't do that. You gotta wait, gotta participate.</p>
<p>09:12</p>
<p>You have to remain competitive. And you'd have to remain looking at advanced technologies, because that's where the competitive fronts battles.</p>
<p>09:21</p>
<p>to sort of make that a concrete statement. We were here, what, three years ago, I think it is give or take a few whatever. We were here, and the conversations have changed dramatically, from what it was just just three years ago, to what it is today, where it is real. And then people are just like, yep, digital twin. Yep. All right there, man. We're hopping on this, that and we're doing things that didn't happen. COVID But I think no, see, I think my belief is that COVID helped facilitate it a speed</p>
<p>09:56</p>
<p>of this did in some degree. Yeah, directions. Absolutely. Absolutely. Because</p>
<p>10:02</p>
<p>if I'm a business, I all of a sudden realized how maybe vulnerable I am. Oh, I was, I was thinking about this neat little thing called digital transformation. And I might have been doing it. Now all of a sudden, it became real. It became a thing that it's like, oh, this is I need to survive. I need. This is my problem. I need visibility. Let's make it happen. And I think that</p>
<p>10:22</p>
<p>that's good. Yep. Yep. Yep. And it's been an interesting mix of of exhibitors on this for this year. There are a lot of companies that I wouldn't traditionally see at this show. But I think it's part of the evolution as we evolve beyond IoT. So you're seeing companies with different technologies and different takes and different pieces of the ecosystem? And that's really cool.</p>
<p>10:45</p>
<p>You're absolutely right, because I had been walking the floor, and I've gone, why are you? Why are you here? But back to that collaborative. There is this compounding that takes place and saying, Hi, I'm a technology and I, I do this, and then somebody comes in and says, you know, I'm a technology, I've got this innovation, and then all of a sudden those two people talk and say, what if we did this, creating a new use case? Say it'll do this? And then that's just the beginning of it. Right? And he's just got to keep on feeding it. Just keep on going.</p>
<p>11:15</p>
<p>But it's all about the solutions, right? So it's not about the technology, per se, it's it's about applying it as solutions. And it is solving problem solving problems. Yeah, it's it's a beautiful thing. And I just think that's how much fun can we have? Yeah,</p>
<p>11:32</p>
<p>we were chirping last night. And you were saying, Hey, how about this? How about that? It doesn't stop? No. Now, which, which is a good question to ask. Because there's a velocity because there's this buzz. The masses don't see this. This is this is happening here. And it's great. And it's wonderful. But a lot of people don't know, though, but it will affect them, it will affect them. How do we increase that visibility? Because it's just it's, it's so what</p>
<p>12:02</p>
<p>you have to Scott, I mean, you know, people don't ask how gasoline is required. They just want to go into their classroom, right. And people don't necessarily want to know how technology came about. They just want to know they can use it, use it and make it simple for me. We were the standards business alone, we used to say nobody wants to see sauce standards being made just like sausage. In the end user just wants to standard. They don't want to know. So I think there's a special market for people like us. Oh, yeah. Alright. Yes, technologists who understand where we're where we have to go to apply these technologies. And we're learning now how to do it. And the whole idea of the Congress is to bring in people that have already done it to some degree so that we can learn from them. So rather than to have a bunch of vendors stand up and tell us we want to have their customers stand up and say, This is what worked this is what didn't work. This is the ROI on getting this, these were the problems I had, yeah, these are the problems I was able to solve. These are the problems that are still out there. Out of insecurity, right? Interoperability always gonna be it's just all well, it doesn't matter what technology to always have in the cyber security people here. Awesome. That's part of the ecosystem. Yeah.</p>
<p>13:09</p>
<p>See, what is also interesting as, and I think that what you provide team OMG team, Congress, Team consortium provide is a a trusted ecosystem of people who are trying to solve the problems, and then be able to have a way of sharing to say, hey, this worked. This was I did this and but that conversation has to happen, or, or it will, it won't progress. Right. Right. Because, again, there's a velocity out there that that is just blistering.</p>
<p>13:48</p>
<p>Yep. And the thing that comes shining through face to face matters. Tell people I have literally zoomed out.</p>
<p>13:58</p>
<p>Yeah. I didn't realize how many cues I take from face. Right, right. Like, Oh, I must have said something wrong. Maybe they didn't understand that maybe I need to clarify things just sort of in the head. Just start, you know, rattling</p>
<p>14:13</p>
<p>I just had three people bumped me on the way over here that wanted to talk to me</p>
<p>14:16</p>
<p>now. Phil Hoffman, just your bill was virtual,</p>
<p>14:22</p>
<p>you know, they'd have to you'd have to send me an email.</p>
<p>14:26</p>
<p>Or you could do what I do. And I just have a Calendly link and everybody just jumps on in any way and I'm just sort of sit at my high and you are great. Let's talk.</p>
<p>14:36</p>
<p>I actually tried that didn't work. For me. It's like everybody everybody glommed on, like I was</p>
<p>14:41</p>
<p>just gonna say, How come I didn't get a link? Because it's true.</p>
<p>14:46</p>
<p>Unfortunate where people want to sell to me that we wanted to sell to</p>
<p>14:50</p>
<p>true Gosh, but everybody in that COVID world that we're trying to survive, so are trying to figure out what what we're selected Uh, and and for me, it's a good feeling to just see people back to semi normal next year is going to be even better next year is gonna, you know, we're just gonna have to be optimistic about it. What what dazzles me is what kind of conversation is going to happen next year after something like this where people all of a sudden say, oh my gosh, I've met you at IoT solutions World Congress, and we were talking, and then they build that relationship, and they'll come back here, presented whatever. Yep,</p>
<p>15:32</p>
<p>yep, we're onto something big. You</p>
<p>15:34</p>
<p>guys are our fan. And I started getting the picture. And you know, I just, I sit in, I'll buzz around. And that's great. But But now I understand.</p>
<p>15:43</p>
<p>Not only that, it's fun. It is. It's fun.</p>
<p>15:48</p>
<p>So, so throw some future stuff at us. Right? Give me some sort of thing that should blow my mind's. Yeah, I'm calling you on the carpet there? Because I'm always Because? Because I just have those the team over there that was dealing with the the augmented reality charm and all that stuff? Oh,</p>
<p>16:07</p>
<p>sure. Well, you know, there's an old joke about the factory of the future. And that is it has a one employee and a dog, dog. And the dog is here. So the employee doesn't touch anything. But that's where we're at. I know, right? I mean, because you got computer vision, you have reality, you have augmented reality, artificial intelligence, you have all these technologies that we can bring to bear. And will will create a better world, a more efficient world. It's going to be a great run.</p>
<p>16:43</p>
<p>And maybe it's just me, every time I come here, my wife gets sick and tired of talking to me, because I'll just sit there. Did you see this? Did you? Oh, my gosh, how about that? I can't believe it. I'm having a hard time putting my mind around now. Like, I just I sound like an old Briggs and Stratton engine. I can't stop talking about it. Because Because there's smart people out there. And I just went when somebody says, Hey, how about this guy? I didn't even think about that. Or I didn't think big enough. Or I just said really? It's exciting. So how does somebody get to be a part of the Congress, the consortium? Get a hold of you? What's the best way to say hey, I want to get a gauge to</p>
<p>17:26</p>
<p>or www dot O M G dot o RG?</p>
<p>17:31</p>
<p>That's us. Yeah. There you go.</p>
<p>17:33</p>
<p>By the way, we were just talking earlier, somebody asked me about presenting oh my god, the first guy ever heard say That was Bob Metcalf VentureBeat.</p>
<p>17:45</p>
<p>All I can remember is object oriented identity is not Object Management, object oriented, totally. Cobalts in there. Again, Rockstar, thank you very much. And once again, we're broadcasting from the IoT solutions World Congress put that on your bucket list is going to be bigger, better and in just next year is going to be incredible. Because Where where are these guys going to take? Kids never stops? Standards? Just absolutely. All right. You're gonna get all Phil's contact information out on industrial talk and all the links to IoT and in the consortiums. See how it did ask because you don't just have one? No majority consort, the</p>
<p>18:28</p>
<p>digital twin console. Industry is solely responsible for new augmented reality new dad, plus the standards development. So yeah, we're busy guys.</p>
<p>18:40</p>
<p>Yeah. Awesome. All right, we will be right back. So stay tuned, do not go away. You're listening to the industrial talk Podcast Network.</p>
<p>18:56</p>
<p>Right, once again, thank you very much for joining and supporting industrial talk and learning with me, because I'm telling you right now, the learning never stops. You have to be about educating, collaborating and innovating. It's it's happening and it's happening fast. Thank you to build up. Did I tell you did I tell you paper and pencil? And there's a lot more get engaged? Well, I'm G getting engaged with IIC. And definitely, definitely. But the IoT solutions World Congress on your calendar, you will not be disappointed, great leaders, great solutions, solving problems and making our lives better. How can you argue with that? All right, again, industrial talk is where you can connect with Bill hoppin, do it, make that a priority? And then hang out with those folks at OMG? Because you will not. I mean, it's it's an important time. Thank you once again for joining and hanging out with people like Bill Hoffman and you're gonna change the world. We're gonna have another great conversation from IoT solutions world coalition</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/bill-hoffman-omg/">Bill Hoffman, Chairman and CEO of OMG</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://industrialtalk.com/episodes/bill-hoffman-omg/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://podcasts.captivate.fm/media/cafa42d0-491b-4437-9acb-05b9d2ceaedc/Bill-20Hoffman-20Conversation.Mp3" length="28828655" type="audio/mpeg" />

			</item>
		<item>
		<title>Vesku Turtia with Armis</title>
		<link>https://industrialtalk.com/episodes/vesku-turtia-armis/</link>
					<comments>https://industrialtalk.com/episodes/vesku-turtia-armis/#respond</comments>
		
		<dc:creator><![CDATA[Scott MacKenzie]]></dc:creator>
		<pubDate>Thu, 07 Jul 2022 15:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://industrialtalk.com/captivate-podcast/vesku-turtia-armis</guid>

					<description><![CDATA[<p>On this week's Industrial Talk we're onsite at IoT Solutions World Congress and talking to Vesku Turtia, Regional Sales Director with Armis about "Identifying and Securing your Digital Transformation Strategy".  Get the answers to your "Connected Assets" questions along with Vesku's unique insight on the “How” on this Industrial Talk interview!</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/vesku-turtia-armis/">Vesku Turtia with Armis</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="cfm-player-iframe" style="width: 100%; height: 170px; margin-bottom: 20px; border-radius: 10px; overflow:hidden; border: 1px solid #d6d6d6;"><iframe style="width: 100%; height: 170px;" frameborder="no" scrolling="no" seamless allow="autoplay" src="https://player.captivate.fm/29b33981-e9df-4e94-b078-f9903c6e8827"></iframe></div><p>On this week's <strong><em>Industrial Talk </em></strong>we're onsite at <a href="https://www.iotsworldcongress.com/" target="_blank" rel="noopener">IoT Solutions World Congress</a> and talking to <strong>Vesku Turtia, Regional Sales Director</strong> with Armis about <b>&#8220;Identifying and Securing your Digital Transformation Strategy&#8221;</b>.  Get the answers to your &#8220;Connected Assets&#8221; questions along with Vesku's unique insight on the “How” on this Industrial Talk interview!</p>
<p>Finally, get your exclusive free access to the <a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener noreferrer">Industrial Academy</a> and a series on “<a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener noreferrer"><strong>Why You Need To Podcast</strong></a>” for Greater Success in 2022. All links designed for keeping you current in this rapidly changing Industrial Market. Learn! Grow! Enjoy!</p>
<h2>VESKU TURTIA'S CONTACT INFORMATION:</h2>
<p><strong>Personal LinkedIn: </strong><a href="https://www.linkedin.com/in/veskuturtia/" target="_blank" rel="noopener">https://www.linkedin.com/in/veskuturtia/</a></p>
<p><strong>Company LinkedIn: </strong><a href="https://www.linkedin.com/company/armis-security/" target="_blank" rel="noopener">https://www.linkedin.com/company/armis-security/</a></p>
<p><strong>Company Website: </strong><a href="https://www.armis.com/" target="_blank" rel="noopener">https://www.armis.com/</a></p>
<h2>PODCAST VIDEO:</h2>
<p><iframe loading="lazy" title="Vesku Turtia With Armis" width="500" height="281" src="https://www.youtube.com/embed/_7YXD6_TbNA?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<h2>THE STRATEGIC REASON &#8220;WHY YOU NEED TO PODCAST&#8221;:</h2>
<p><a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-content/uploads/2020/02/Why-you-need-to-Podcast-Graphic-2.png" width="1024" height="538" /></a></p>
<h2>OTHER GREAT INDUSTRIAL RESOURCES:</h2>
<p><strong>NEOM</strong>:  <a href="https://www.neom.com/en-us" target="_blank" rel="noopener noreferrer">https://www.neom.com/en-us</a></p>
<p><strong>Hitachi Vantara:</strong> <a href="https://www.hitachivantara.com/en-us/home.html" target="_blank" rel="noopener noreferrer">https://www.hitachivantara.com/en-us/home.html</a></p>
<p><strong>Industrial Marketing Solutions:</strong>  <a href="https://industrialtalk.com/industrial-marketing/" target="_blank" rel="noopener noreferrer">https://industrialtalk.com/industrial-marketing/</a></p>
<p><strong>Industrial Academy:</strong> <a href="https://industrialtalk.com/industrial-academy/" target="_blank" rel="noopener noreferrer">https://industrialtalk.com/industrial-academy/</a></p>
<p><strong>Industrial Dojo:</strong> <a href="https://industrialtalk.com/industrial_dojo/" target="_blank" rel="noopener noreferrer">https://industrialtalk.com/industrial_dojo/</a></p>
<p><strong>We the 15:</strong><a href="https://www.wethe15.org/" target="_blank" rel="noopener"> https://www.wethe15.org/</a></p>
<h2>YOUR INDUSTRIAL DIGITAL TOOLBOX:</h2>
<p><strong>LifterLMS:</strong> Get One Month Free for $1 – <a href="https://lifterlms.com/" target="_blank" rel="noopener noreferrer">https://lifterlms.com/</a></p>
<p><strong>Active Campaign:</strong> <a href="https://www.activecampaign.com/?_r=H855VEPU" target="_blank" rel="noopener noreferrer">Active Campaign Link</a></p>
<p><strong>Social Jukebox:</strong> <a href="https://www.socialjukebox.com/" target="_blank" rel="noopener noreferrer">https://www.socialjukebox.com/</a></p>
<h2>Industrial Academy (One Month Free Access And One Free License For Future Industrial Leader):</h2>
<p><a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-admin/wp-content/uploads/2019/10/Industrial-Academy-Graphic.png" width="1024" height="538" /></a></p>
<h2>Business Beatitude the Book</h2>
<p><img loading="lazy" decoding="async" class="alignleft" src="https://industrialtalk.com/wp-content/uploads/2019/10/BB-Book-Cover.png" width="138" height="215" /></p>
<p class="ql-align-center">Do you desire a more joy-filled, deeply-enduring sense of accomplishment and success? Live your business the way you want to live with the BUSINESS BEATITUDES&#8230;The Bridge connecting sacrifice to success. <strong>YOU NEED THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><strong>TAP INTO YOUR INDUSTRIAL SOUL, RESERVE YOUR COPY NOW! BE BOLD. BE BRAVE. DARE GREATLY AND CHANGE THE WORLD. GET THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><a href="https://industrialtalk.com/business-beatitude-reserve/" target="_blank" rel="noopener noreferrer"> Reserve My Copy and My 25% Discount</a></p>
<h2>PODCAST TRANSCRIPT:</h2>
<p><strong>SUMMARY KEYWORDS</strong></p>
<p>iot solutions, Armis, cybersecurity, connected, secure, iot, conversation, connect, industry, digital transformation journey, companies, industrial, devices, assets, iot devices, cybersecurity strategy, talking, innovation</p>
<p>00:00</p>
<p>Industrial Talk is brought to you by Armis. Yes, you were in the digital transformation game. Yes, you need to find trusted companies, trusted individuals to help you along with that journey. The Armis platform delivers complete asset intelligence, you know what that means, insights into your connected assets, you're in the digital transformation game, you have to have that insights into what is connected, go to armis.com Find out more, you will not be disappointed. Also industry IoT Consortium. At industrial talk, we always talk about education, we always talk about collaboration, we are always talking about innovation. And if you're a business that has any desire to be resilient to the future, you need to be able to educate, collaborate, as well as innovate with other industry professionals. That's a must. Industry IoT consortium brings that all together, you need to be a part of this community, you need to be connected with these leaders that are all apart the Industry IoT consortium, go out to iiconsortium.org. Find out more again, you will not be disappointed. You're just going to be happy. Hey there, and welcome to industrial talk. Thank you very much for joining. We are broadcasting. Well, we are on site at IoT Solutions World Congress, we had a great time we were broadcasting from that location, it is a must attend event. So put that on your calendar that is in Barcelona. That's the IoT solutions World Congress. Now, in the hot seat, we have a gentleman by the name of Vesku Turtia, and he is with a company called Armis. He is the Regional Sales Director for them. And we're just talking about the ability to be able to identify your assets. If you're in the digital transformation game, identify those assets, secure those assets, so that you can reap the benefits of this digital transformation journey, it's important for you to be able to identify all your assets, and Armus is leading the way. So enjoy the conversation.</p>
<p>02:16</p>
<p>Yeah, you haven't heard conference.</p>
<p>02:18</p>
<p>So far, So good. We started today. So there's a lot of people in the conference rooms in the different presentations. But yeah, I mean, people are passing by the booth. And so far, so good. No complaints.</p>
<p>02:33</p>
<p>No, I wouldn't listen to you. If you had any complaints, I would say. Forget it. Forget it. All right. So some of the information or some of the conversations that we were having at this particular event, IoT Solutions World Congress, how about that for plug another one? Is that, okay? We have made the determination from an industry perspective that we want to connect pretty much everything. And I mean, everything they want to, they want to connect with my dog for whatever reason, but they want to connect to everything. And one of the conversations that I think that needs to happen is how do you secure that? Talk to us a little bit about Armis, securing that connected, because if you're not connect if you're not securing it, this whole digital transformation journey, whatever it might be, is all for naught. Right?</p>
<p>03:18</p>
<p>Yeah, exactly. And, you know, for the CISOs of the modern companies today, I mean, they have a pretty, pretty tough job. And as Today we talk about the IoT, this fear, so, so a lot of people doesn't even realize and understand that, that in the today's connected world, there are way more IoT devices connected to corporate networks than PCs and mobile phones. So therefore, in order to make a specific and very good cybersecurity strategy, the first questions that everybody should ask, Do I understand what I have connected to my network? If I don't, I mean, making making a solid cybersecurity strategy becomes quite difficult if you don't know and control what do you have connected in your in your network? So that's what we do. We help companies to get to knowledge what they have connected internet,</p>
<p>04:15</p>
<p>because the reality is, is that here's this IoT world, if somebody tripped out IoT or industry to Dotto, right, and it's like, okay, everything, we're going to connect everything, that's one, and then that it's sort of like cart before the horse type of deal. You mean, I can just stick that device out on this pump, and I can measure it, but nobody really thought at that particular time. They just sort of put it out there collecting data. Oh, good. But the the vulnerability that exists, exactly. How does RMS ensure that you see everything? What needs to be seen?</p>
<p>04:49</p>
<p>Yeah, well, I mean, we'd like to talk about two types of devices. We talk about Manage Devices and and manage devices to manage devices as the ones were You can wait, you can put a program in it like an SDR. So you can put an h in there. And then the announcement is devices are these that you can't because you know, IP cameras, blah, blah, blah, you know, you name it, there are tons of I mean, I can't even name half of the IoT devices or devices that are out there. But there are more than mobile phones and PCs, what I just mentioned. So what we do, we work with our agent, because we can't automate and build those devices, because by the design they've made, you can't do that. So by listening to network traffic, and putting our collectors to the strategic places of the customers networks, we can then give an inventory real time, what the customers have in connected in the network. And then the inventory. We call it discovery. It's a great piece. But after you have that one, do you know what happened? Scott? No, the inventory changes day by day. You're right about that? Yeah, exactly. So So if when you have the inventory, then you have to monitor that. So we do that 24 By seven, obviously, in the passive mode, we work with the hospitals, we work with the critical industries. So we need to be 100% passive, so we do that. So we monitor that. And then the third part is the security assets, you know, so how we do that, we do that through integrations with the third party products with the sub with the different CRMs, with SDRs, with CMP DS with tax and everything. So so so we have a buddy of everybody, so so. So we listen to the traffic, we tell you what you got. And then through the integrations we we had the customers to do due to be more secure and avoid those famous ransomware lateral movements from IoT device to another it demons.</p>
<p>07:04</p>
<p>There appears to be an education here that the industry needs to go through. I think just like anything else, you come to an event like this, and you're you get exposed to a lot of great, great, you know, solutions. Do you find that there is a potential gap with the cyber conversation with many of these solutions? Like, great, you're in the you're in critical infrastructure? How are you protecting that? And I think it would be a natural conversation.</p>
<p>07:39</p>
<p>Yeah, it is. It is. I mean, I'm not telling your name. But you know, there was 111 customer, one customer came to talk to me and they are in the water treatment business. So So</p>
<p>07:51</p>
<p>Josh. So social better treat that water properly.</p>
<p>07:56</p>
<p>Absolutely. So so that's the thing that we get some to tap and we drink it and stuff like that. But you know, in this particular case, they said that we have all servers, they've never failed. So So our strategy is not to touch them. And I said, Why are you sure about that? So so the apparent education, what you meant, I mean, it really depends. You know, the cyber world. I mean, I like to use the common sense thing, you know, if you get an email that you don't know, if there's a you know, weird things, but still, you know, 80% of the people, they still have to go and click the link and stuff like that. So I don't I don't believe I'm sorry to say that I don't believe in that education. It just doesn't work. You need to, you need to put you know, better barriers and and do things properly.</p>
<p>08:49</p>
<p>Who and I think you bring up a good point you we have this just human nature, this human tendencies to say, You mean, I want something, let me just open it up. And that's just natural. The other thing that I see that exists is the fact that as we journey down this road, we, you know, we're gonna get exposed to all this great technology and innovation, great thumbs up the people or the individuals that happened to various type of intent. They're licking their chops. They're saying, Hey, we're, we're learning as you guys learn, and we're learning the bad side. And you got a better you better have your act together.</p>
<p>09:33</p>
<p>Exactly. Exactly. This is this is you know what I'll, you know, like arms a lot I've been I've been in the white, perhaps too many cybersecurity companies in the past 22 years.</p>
<p>09:45</p>
<p>You look 20</p>
<p>09:46</p>
<p>Thank you. Thank you. You're welcome. Anyhow, but but but the real value proposition that RMS is giving to the market is really simple. I mean, do you know what do you have? Do you think it's important to know what do you Have? Of course it is and then do it in the simple manner enough to show the value from the next minute when you block in the collector into a customer network that really that really, you know, it's really cool for average sales guy like myself, so. So,</p>
<p>10:18</p>
<p>you know, you touched upon something and I want to expand a little bit, I think real I think the use cases that exist out there have to incorporate simplicity. If they do not if they it could, it could solve whatever problem but if it's difficult for, you know, me yep. Then if I shy away from it. So I think that that's an incredible statement that that doesn't need to be glossed with making it simple. Exactly. Look,</p>
<p>10:48</p>
<p>for instance, the same products, I mean, how many cm vendors, they're out there, they are very cool. And they do the compliance the thing really well. But what you know, unfortunately, a lot of times, I mean, if you don't have enough resources, and you name your company, who was tells that I have enough resources, there is none. So so so some of these very large projects, becomes headaches, and we'll never get you know, finished. Because they bring more complexity into the, into the value chain.</p>
<p>11:21</p>
<p>That's huge. That's huge. And whether whether it's good, bad or whatever, I know I'm lazy. I know that there is a necessity to do things, right. But if you can do things, right and remove, I don't want more headaches. Right? And so that's the reality of and I love that, that approach. Now. Where do you see it going? What? Put a little future hat on here? What do you see it go?</p>
<p>11:52</p>
<p>Well, you know, IoT, and internet of things. I mean, imagine the buddy buddy, Elon Musk, what he's doing what he's good is there is there is somebody that is I don't know if it translates to English, but who reads the future. And that there is there's a claim that says that was it 2035 445 I can't recall, anyhow, that you know, humans can't be driving cars anymore. So so everything will be connecting. So this connectivity, and the EOD connect Internet of Things will go boosting. So so so therefore, I see a very bright future for armies, because, you know, there will be more and more connected devices.</p>
<p>12:39</p>
<p>I don't think you can gloss over that. I think that as you come to an event like this, then you start talking to other trailblazing innovators that that exist here. It just opens up more use cases, which then opens up more conversations around cybersecurity. And it just goes on and on. I don't see it ending anytime soon. And it and again, we're here, get engaged, you gotta get on,</p>
<p>13:04</p>
<p>we are here and we want to be connected. And we want to be more connected in the future. So cyber is the thing. And the security is the other thing and knowing what you have, it's the third thing. So</p>
<p>13:16</p>
<p>there it is the trifecta of bumper stickers.</p>
<p>13:19</p>
<p>Exactly. All right.</p>
<p>13:21</p>
<p>How do people get a hold of you? How do they get ahold of</p>
<p>13:26</p>
<p>you? Ah, okay, we have a we had a stand together with the CrowdStrike folks, you know, this American company for HDR, which is like, you know, huge. So, so obviously, we've done our emailing and stuff and that, you know, I put meetings, but you know, people are walking and that they see army sacrifice, like in the in the booth. So, I fight. Let's talk cybersecurity</p>
<p>13:49</p>
<p>rescue. Thank you very much for just real talk. Once again, listeners, we are broadcasting from IoT solutions, World Congress industry IoT Consortium is a sponsor as well. If you want to come to Barcelona, come to Barcelona when this event happens, and you just going to get the most out of your trip. So anyway, thank you for being on industrial talk and talking about yes, cybersecurity listeners. I'm all right. Once again, we're gonna be back with another great conversation from this incredible event shortly. So stay tuned. You're listening to the industrial talk, Podcast Network. All right. Once again, thank you very much for joining industrial talk again. Here's the deal. You need to be in the digital transformation game. If you want a business that is resilient, you need to begin to embrace that innovation. But more importantly, once you embrace all that innovation, you need to be able to secure it and know that you're protected. And that's where RMS that's where fescue and team RMS bring a great solution to the table because, quite frankly, you need to secure it. So anyway, I'll have all the contact information for fescue out on industrial talk.com. So don't come to me and say you can't get a hold of it because he's out there and ready to talk. All right. Thank you to IoT solutions World Congress, great event, put that on your calendar. I think they're going to have it at the end of January of next year. So put that on your calendar, as well as the industry IoT consortium, fantastic. organization get engaged because we got to be about education. We got to be about collaboration, we got to be about innovation. Those are organizations that embody that we're gonna have another great conversation shortly so stay tuned, we will be right back.</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/vesku-turtia-armis/">Vesku Turtia with Armis</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://industrialtalk.com/episodes/vesku-turtia-armis/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://podcasts.captivate.fm/media/129e65f2-6743-4789-8016-06585dd3a60d/Vesku-20Turtia-20Conversation.Mp3" length="22478255" type="audio/mpeg" />

			</item>
		<item>
		<title>Milan Kocic with Hexagon Manufacturing Intelligence</title>
		<link>https://industrialtalk.com/episodes/milan-kocic-hexagonmi/</link>
					<comments>https://industrialtalk.com/episodes/milan-kocic-hexagonmi/#respond</comments>
		
		<dc:creator><![CDATA[Scott MacKenzie]]></dc:creator>
		<pubDate>Fri, 11 Mar 2022 15:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://industrialtalk.com/captivate-podcast/milan-kocic-with-hexagon-manufacturing-intelligence</guid>

					<description><![CDATA[<p>On this week's Industrial Talk we're talking to Milan Kocic, Head of Sixth Sense at Hexagon Manufacturing Intelligence about "Why Innovation and Investment is important to Manufacturing.".  Get the answers to your "Manufacturing Technology" questions along with Milian's unique insight on the “How” on this Industrial Talk interview!</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/milan-kocic-hexagonmi/">Milan Kocic with Hexagon Manufacturing Intelligence</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="cfm-player-iframe" style="width: 100%; height: 170px; margin-bottom: 20px; border-radius: 10px; overflow:hidden; border: 1px solid #d6d6d6;"><iframe style="width: 100%; height: 170px;" frameborder="no" scrolling="no" seamless allow="autoplay" src="https://player.captivate.fm/913adffd-d5d5-4a3f-b5e3-74c4b0a445c4"></iframe></div><p>On this week's <strong><em>Industrial Talk </em></strong>we're talking to <strong>Milan Kocic, </strong>Head of Sixth Sense at Hexagon Manufacturing Intelligence about <b>&#8220;Why Innovation and Investment is important to Manufacturing.&#8221;</b>.  Get the answers to your &#8220;Manufacturing Technology&#8221; questions along with Milian's unique insight on the “How” on this Industrial Talk interview!</p>
<p>Finally, get your exclusive free access to the <a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener noreferrer">Industrial Academy</a> and a series on “<a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener noreferrer"><strong>Why You Need To Podcast</strong></a>” for Greater Success in 2022. All links designed for keeping you current in this rapidly changing Industrial Market. Learn! Grow! Enjoy!</p>
<h2>MILAN KOCIC'S CONTACT INFORMATION:</h2>
<p><strong>Personal LinkedIn: </strong><a href="https://www.linkedin.com/in/milankocic/" target="_blank" rel="noopener">https://www.linkedin.com/in/milankocic/</a></p>
<p><strong>Company LinkedIn: </strong><a href="https://www.linkedin.com/company/hexagon-manufacturing-intelligence/" target="_blank" rel="noopener">https://www.linkedin.com/company/hexagon-manufacturing-intelligence/</a></p>
<p><strong>Company Website: </strong><a href="https://www.hexagonmi.com/en-US" target="_blank" rel="noopener">https://www.hexagonmi.com/en-US</a></p>
<h2>PODCAST VIDEO:</h2>
<p><iframe loading="lazy" title="Milan Kocic with Hexagon Manufacturing Intelligence" width="500" height="281" src="https://www.youtube.com/embed/-wGgmZ0Udjc?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<h2>Other Videos of Milan:</h2>
<p><iframe loading="lazy" title="Innovation in Mature Industries with Milan Kocic, Director Sixth Sense Open Innovation Platform" width="500" height="281" src="https://www.youtube.com/embed/g5HZ4Z37brQ?start=149&#038;feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<h2>THE STRATEGIC REASON &#8220;WHY YOU NEED TO PODCAST&#8221;:</h2>
<p><a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-content/uploads/2020/02/Why-you-need-to-Podcast-Graphic-2.png" width="1024" height="538" /></a></p>
<h2>OTHER GREAT INDUSTRIAL RESOURCES:</h2>
<p><strong>NEOM</strong>:  <a href="https://www.neom.com/en-us" target="_blank" rel="noopener noreferrer">https://www.neom.com/en-us</a></p>
<p><strong>Hitachi Vantara:</strong> <a href="https://www.hitachivantara.com/en-us/home.html" target="_blank" rel="noopener noreferrer">https://www.hitachivantara.com/en-us/home.html</a></p>
<p><strong>Industrial Marketing Solutions:</strong>  <a href="https://industrialtalk.com/industrial-marketing/" target="_blank" rel="noopener noreferrer">https://industrialtalk.com/industrial-marketing/</a></p>
<p><strong>Industrial Academy:</strong> <a href="https://industrialtalk.com/industrial-academy/" target="_blank" rel="noopener noreferrer">https://industrialtalk.com/industrial-academy/</a></p>
<p><strong>Industrial Dojo:</strong> <a href="https://industrialtalk.com/industrial_dojo/" target="_blank" rel="noopener noreferrer">https://industrialtalk.com/industrial_dojo/</a></p>
<p><strong>We the 15:</strong><a href="https://www.wethe15.org/" target="_blank" rel="noopener"> https://www.wethe15.org/</a></p>
<h2>YOUR INDUSTRIAL DIGITAL TOOLBOX:</h2>
<p><strong>LifterLMS:</strong> Get One Month Free for $1 – <a href="https://lifterlms.com/" target="_blank" rel="noopener noreferrer">https://lifterlms.com/</a></p>
<p><strong>Active Campaign:</strong> <a href="https://www.activecampaign.com/?_r=H855VEPU" target="_blank" rel="noopener noreferrer">Active Campaign Link</a></p>
<p><strong>Social Jukebox:</strong> <a href="https://www.socialjukebox.com/" target="_blank" rel="noopener noreferrer">https://www.socialjukebox.com/</a></p>
<h2>Industrial Academy (One Month Free Access And One Free License For Future Industrial Leader):</h2>
<p><a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-admin/wp-content/uploads/2019/10/Industrial-Academy-Graphic.png" width="1024" height="538" /></a></p>
<h2>Business Beatitude the Book</h2>
<p><img loading="lazy" decoding="async" class="alignleft" src="https://industrialtalk.com/wp-content/uploads/2019/10/BB-Book-Cover.png" width="138" height="215" /></p>
<p class="ql-align-center">Do you desire a more joy-filled, deeply-enduring sense of accomplishment and success? Live your business the way you want to live with the BUSINESS BEATITUDES&#8230;The Bridge connecting sacrifice to success. <strong>YOU NEED THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><strong>TAP INTO YOUR INDUSTRIAL SOUL, RESERVE YOUR COPY NOW! BE BOLD. BE BRAVE. DARE GREATLY AND CHANGE THE WORLD. GET THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><a href="https://industrialtalk.com/business-beatitude-reserve/" target="_blank" rel="noopener noreferrer"> Reserve My Copy and My 25% Discount</a></p>
<h2>PODCAST TRANSCRIPT:</h2>
<p><strong>SUMMARY KEYWORDS</strong></p>
<p>hexagon, manufacturing, people, startups, innovation, companies, sixth sense, world, milan, work, conventional, industrial, problems, journey, conversation, big, business, thinking, technology, listeners</p>
<p><strong>SPEAKERS</strong></p>
<p>Scott MacKenzie</p>
<p>00:04</p>
<p>Welcome to the industrial talk podcast with Scott Mackenzie. Scott is a passionate industry professional dedicated to transferring cutting edge industry focused innovations and trends while highlighting the men and women who keep the world moving. So put on your hard hat, grab your work boots, and let's go.</p>
<p>00:22</p>
<p>Alright, once again, welcome to industrial talk, the number one industrial related podcast in the universe that celebrates you, industrial heroes all around the world. You are bold, take that to the bank, brave you dare greatly. You're solving problems. You're innovating. You are changing lives and you are changing the world as we speak. why not celebrate you each and every day? Yeah, you're that cool. All right. In the hot seat, we got a gentleman by the name of Milan coaching. He is with hexagon manufacturing intelligence. And he is the head of six. That's a tough word. Sixth Sense, open innovation platform. Pretty cool stuff. We're going to be talking about why manufacturers need to one innovate and invest in that innovation. Let's get that correction.</p>
<p>01:16</p>
<p>Yeah, again, we're talking innovation. We're talking about the necessity to make that investment. Well, you know, you need trust with people. And of course, you'll get a great sense that Milan is somebody you can trust. Yeah. Becton, he's a trusted depot guy. He's gonna just sort of shoot straight and answer your questions. And it's important that manufacturing and bring in manufacturing technology into what you do is very important. It is you gotta you gotta have to do it. Alright, we're sponsored by CAP Logistics, this episode. And let's just say if there's an Oh bleep moment with your supply chain with your turnaround with your whatever outage and you need somebody that you can trust, and you need somebody that can just get the job done. No matter how big CAP Logistics, go to CAP Logistics.com Definitely find out more great people great company, and, and they make it easy, they really do. You don't want to tie yourself down with that Oh, bleep moment, right. And, and with all the other stuff that has to go on, Cap Logistics makes that absolutely easy peasy lemon squeezy. And we're also brought to you by Deloitte, you know, Deloitte, they've got a bench full of incredible professionals that have their fingers on the pulse of what's taking place in industry. And again, it's all about who you trust, it's about who you're going to connect with, that can definitely solve problems. You got to reach out to Deloitte because they have a team of incredible professionals, focused on your success. Go out to deloitte.com Find out more. Alright. So a couple of things that I've been sort of noodling on, outside of the fact that I've been preaching on this. Are you getting the most out of are you extracting? Are you taking that dog gun? Talent squeezing every bit out of your engagements out of your conferences? And is there other ways that you can do that? Or are we just sort of going down the road? And this is my second, in this phase? Are we just going to do the same thing that we've always done? Do we are we sort of embracing conventional thinking, again, that legacy thinking? And I hope that's not the case, I hope that we just, we've got a very dynamic, very challenging environment out there. Hey, you can argue with me, but it is challenging, and it's challenging for industry, and it's challenging for people. And it's got a lot of dynamics happening out there. And we need, we need to really continue to think about conventional thinking, and is that holding us back? So here's a quote, just because why why do I have to create a CRUD? Conventional Thinking does not or doesn't change the world? Okay, because it's really procedural eyes. You know, this is how we do it. This isn't we just do the same thing. crazy ideas do and and working with individuals working with incredible leaders. They they are, there's a real consistency with the fact that there's that conventional thinking is pushed to the side. There's people that do that. But the reality is, are we really trying to think differently about solving problems, creating opportunities, cutting deals, whatever every element of your job, your business, and what you're doing? Has to really sort of take that at the forefront. I'm always intrigued now and I'll be the first to admit, I love individuals, companies that are doing things that are so unique, and so different. And and, and this is a collaboration. And it's a collaboration mindset. Because if you're truly want to fight that legacy, that conventional thinking, you're going to have to hang out with people who are at the same place, we are saying, this whole thing we can't survive in this, whatever this is, with conventional thinking. And I'll throw it out there. Because I think that that's the case. I think companies that are really creative, who are truly inside their heart desiring to get the most out of these engagements, and be mutually beneficial, and give of themselves so that other people survive, I'm telling you, that is where it's at. That is where it's at, okay? Just put that noodle wanted to ask that question, be truthful, do all that stuff, all right, an event.</p>
<p>06:01</p>
<p>And I'm very fortunate to be able to work with the IoT solutions World Congress, and this is an event in Barcelona, it is May 10, to the 12th. And I've been there pre pandemic, not during the pandemic, you know, the whole story there. But it really the the organizers, the people who are engaged in this particular event, really understand the necessity to create value. So if I go to this, this event, IoT solutions, World Congress, I would get the most out of that engagement, I go over there outside of Barcelona and be just a great place, don't get me wrong. But to be able to meet up with other companies, it's that that are also having a desire to do things to collaborate to really solve problems, and work in that sort of environment. That's what IoT solutions World Congress is creating. So if you go there, and you're just gonna say, hey, I want to just eat up by Aya, and drink the, you know, the wonderful sangria, while you're missing out, you're missing out on an opportunity for a great event to be able to impact your bottom line in a positive way. IoT solutions World Congress, that's may 12, or may 10, through the 12th. Put that on your calendar, Barcelona, and you can't you can't complain about that. That's Barcelona. All right. Now back to the interview. So what's interesting about this conversation outside of fact that I think Milan, and team hexagon manufacturing intelligence, which is glad that's not a domain, because I'd misspell it. But they they recognize this necessity for a real a ecosystem that is focused on innovation for manufacturers, and then be able to go to a place or go to a Yeah, a place physically, and come up with real solutions that solve your problems. Right. And, and that's what we need, specially in the world of manufacturing, we need to have that. And, again, I broadcast from the manufacturing and technology show. And one of the things that was brought to my attention is at that trust, we've got to find trusted people, companies to help us with this transformation journey, right? That's what hexagon manufacturing intelligence and their, you know, focus on this sixth sense. Great conversation, we pretty much dove into a lot of things. So enjoy the conversation with Milan, Milan, welcome to industrial talk. Thank you very much for finding time in your busy schedule. I'm looking out. If you're at the video, if you're looking in the video, and you can see back there, it looks cold back behind you. Is it cold?</p>
<p>08:55</p>
<p>It's actually not too bad. It's 64 degrees in lovely providence. But yeah, it will it will snow tomorrow. So it's not it, don't worry about it. It's New England. So anything goes</p>
<p>09:04</p>
<p>yeah, here in Louisiana, I have the AC on. And I'm not happy about that. I want it to be cold a little longer. Alright, for the listeners, let's get cracking on who Milan is give us a little background on who you are.</p>
<p>09:18</p>
<p>Sure. I'm a head of sixth sense open innovation platform at hexagon. It's our new kind of way of trying to engage startups and innovative thinking. But I've spent almost 25 years at hexagon in various roles, most recently, last 12 years in innovation. So I've done development of new products, services and all kinds of other stuff. So this is kind of culmination of everything that I've done in the past. I gotta</p>
<p>09:43</p>
<p>tell you, man, that's pretty cool. Because you've been if you've been there that long, you've seen a lot of innovations. You've seen a lot of growth and do you find it's, it's there's a speed right now that that I mean, I think it's fast. Do you find that happening?</p>
<p>09:57</p>
<p>Well, anybody who is anywhere from Five years, including a marriage has seen a lot of good and bad stuff, right? So I would say there's good usually tends to outweigh the bad. But I think part of what I'm doing now is a little bit of a frustration with speed in mature companies, because sometimes mature companies have a priority of doing things that they do well. And the speed of innovation sometimes outpaces their ability to kind of, you know, manage risk, do different things, and all those kinds of stuff that kind of they get into it. So it's always a balance at the end of the day, but it's you know, and some days are good, some days are bad.</p>
<p>10:35</p>
<p>So how do you how do you get a company that's sort of, shall we say, mature, and begin to, I guess, methodically embed or begin to go down that innovation route to see the value? What is it important?</p>
<p>10:52</p>
<p>Well, it's important well, you know, technology curves are very brutal, which is, there's no like a slight decline in curves. It's just one day, one day, you just fall off a cliff and you're wrong, irrelevant. You know, prime biggest example, probably the listeners know is like Blackberry, you know, Blackberry ruled the phones. And then one day, nobody knows who BlackBerry is. So you always have to fight for relevance. In some ways, I think managing your quarterly profits, and everything else in the same breath is you're trying to do risky investments and kind of innovation is hard to manage, especially if they're in the same organization. So part of kind of what we're doing is we separated this area of where we're going to explore an experiment, so that I don't, you know, I don't have to do roll up reports and quarterly p&l and everything else, I kind of live a little bit of outside of the comfort zone of the organization, and I'm getting some freedom to explore with, with startups what to do. There's a second reason for that. A lot of mature companies say that they want to work with startups. But I have this like theory, what it does is you just have a lot of lunches and dinners with them. And you actually never really do anything. So what you do is you create this fantasy of what the future could be like, but because of your operational kind of discipline, you have a really hard time, parlaying that into something useful. So you have to have something in some sort of a conduit, let's call it a speed dating service. Yes, startups. And so six senses actually that in like, 10, we compress the kind of let's get to know you. And then we decide if we want to get engaged, don't get married, or just go out and wait just doesn't really matter what it comes out of it. But rather than stretching this into five year kind of things, you do it relatively quickly. And even if it doesn't work out, you just start now keeping an eye on that startup, like, is there something we can do to just help them along? Because Sixth Sense, main interest is to help startups be successful. If that also benefits hexagon, that's awesome. But that's not necessarily my I'm, I would consider myself successful if one of these startups becomes a unicorn or half a unicorn or whatever you want to be. If we get to play the role in it, and we are part of the journey, that's awesome. If not, it's still a success at the end of the day, right?</p>
<p>13:09</p>
<p>So okay, so let's take that analogy. So, I'm a, I'm a manufacturer, startup, I'm here, I'm small, I've got, I've got grand visions, I come to you and I say, hey, grand vision guy right here. And I want to be able to see where we can go with this. And so we're gonna speak date, you're gonna you're gonna ask me some questions. We're gonna, we're gonna sort of ferret this out relatively quick. Let's say you're saying that it's not a good fit, however, however, we think it's, it's it's got potential. Are you saying you will help facilitate and maybe help that journey too, as well? That's not within granule? House exiga?</p>
<p>13:50</p>
<p>Correct. I mean, the the options could be that a startup gets introduced to a customer, a customer sees a potential that doesn't fit to hexagons, prerogatives. And our customer takes on the burden of trying to support the startup to do something, it could be a clean just investments, we bring in some venture capital. And together, we basically pump some cash into the startup and help them on their journey. Or it could be some kind of a joint venture OEM agreement, where we just basically give them the channels to facilitate, but they may be on the fringes of like what hexagon does, and then over time, that parlays into something because what we're looking at, you know, this horizon one stuff, stuff that fits really well into the business. But there's also horizon two and three stuff, like stuff that we don't know. So how are you going to find out if you don't start dabbling in those kinds of areas? So to me, it's just a way where you can find opportunities and options without necessarily, let's say, you know, burdening the day to day business because it's really hard to get attention and like, you know, I mean, you know, I, you know, I got to make products and satisfy customers. and deliver things oh, crap, there's this now person, I want to want to talk to him about innovation. And it's just balancing that. And now we have this safe space. And then we can explore, because I have a have a kind of a view on the typical accelerator where you come in, we teach you some classes, and I'll give you 100 grand for your 12% stake in the company. I think they're kind of empty, you know, in a sense, because not every company is the same, you can't package advancement in business into some kind of a book, at the end of the day. Everybody has, you know, you know, yourself. Founders come from different backgrounds, they come from different areas in the world, our program is global, which means, you know, somebody from Singapore and somebody from Louis, you know, Louisiana are not necessarily going to be the same people, they won't have the same priorities, they won't see the business same way us does a certain thing certain way, Singapore does it another way. So putting something into a box, it's a really hard way to manage things, you have to kind of be slightly flexible, and be able to adapt what there are opportunities to scale are truly in front of us. And then we see what it is, and we do the best we can to make them successful.</p>
<p>16:07</p>
<p>I like the terms be dating, I like that, that that to me since since a urgency sort of message, but at least you could still get that thing moving. I like to save space concept. And and being able to open that up, I think I think you're onto something pretty big here. And the reason I think that is because because of the speed of innovation, that what I see out here, that that it needs a place like this, for other companies to be able to sort of take it's it's so fragmented out there. So if I have a place to go, I don't know where I'm at in my journey. But let's say I have a place to go at least that's my North Star, I can go there. And then begin sort of that journey of time, as opposed to this sort of scattergun scattershot, hopefully I'll find some sort of solution that works or whatever it might be. Well, it's, it's, it's</p>
<p>17:04</p>
<p>you flip it to the what are, what are mature companies really good at? Well, mature companies are okay, at innovation, they still they do a little bit of incremental things here and there. But what mature companies are typically really good at is making money. So my job is not really to teach the startups on technology and everything else, we can look at the fit and see how things fit, you know, how does one plus one equal three, but what we are really good at is telling them how they can potentially scale their business. Because think about it, a small startup that makes a million bucks, and it works and is out of Louisiana. What is their opportunity to globally scale? How are they going to do that? Well, if you have hexagon, we are everywhere. So if we see the opportunity in certain parts of the world that fit this particular business, we basically helped them, you know, feel, you know, skip over certain steps that they would have to be painful for them otherwise, and try to leverage that experience from our end to help them scale. So to me, you know, let's do the stuff that we are good at and imbedded into the startups and let them help us be better at what they're good at, which is innovative kind of, you know, out there thinking and try to embed that into our own culture. So it's kind of like a 5050 thing at the end of the day.</p>
<p>18:19</p>
<p>So just an FYI, I hear people the listener saying at this is still just a thing for Hexagon. How do you sort of quail that? That pushback because I love it? Don't get me wrong? I think it's brilliant. But they're you know, there are people out there said, this is just an infomercial for Hexagon.</p>
<p>18:43</p>
<p>Let's be honest, partially it is I mean, at the end of the day, it is a marketing and a PR efforts so that people understand what hexagon does and how we do it. That's one part of it. Because it's inevitable, always, anybody who tells you otherwise is I think lying. What we're trying to do is while it could benefit has going on so one of the out potential outcome is it that we either acquired a company company shares the technology, we build something bigger together, of course, there's a benefit to hexagon in the longer run from a business perspective. But I think, you know, you and I have discussed this offline a little bit, which is sometimes you just want to do things because they feel good, right? I mean, like, not everything has to be a pre calculated move and premeditated by everybody. I think sometimes it's just good to do things kind of, like my big push is diversity and inclusion angle. I'm an adoptive dad of a little black girl and watching the world through her eyes. I want to make sure that the world is a better place and more inclusive in the future so that she has an option to start a company and be able to raise funding and be able to do other things. And I think some things you just have to do because they're good things to do. So it's not that it's a 5050 Yeah, of course if we FANUC hexagon benefits, there will be an awesome thing to do. But we also want to do things because at the end of day, we want to be viewed as people who are truly interested in a welfare of a startup and help them be successful. I mean, that should be the ultimate kind of thing where we want to go</p>
<p>20:14</p>
<p>see, and I like it, because let's just use a sports analogy, let's move that ball forward. And if companies like hexagon, and others big, do a good job at what they do, there is a necessity to try to continue to push that innovation and move that ball forward. And that is, from my perspective, a smaller company, nimble, willing to take that risk, get out of that conventional thinking that traditional thinking, and and be able to do that. And it's a way of like hexagon, and other companies to be able to participate in that energy, that excitement of that innovation, and be able to help everybody all around. It's a win win. And yes, doggone it, if you're listening out there, you better be about making money. And this is another way of being able to really help people achieve that success. And by the way, when your daughter gets married, or where it'll break your heart.</p>
<p>21:16</p>
<p>Thank you for the warning. It is. She's only, she's only</p>
<p>21:20</p>
<p>just telling you, it'll go by fast. Just FYI.</p>
<p>21:24</p>
<p>Thank you break your heart. Thank you.</p>
<p>21:27</p>
<p>I'm living proof, and I'm still struggling. Alright, so let's say I'm young, I'm nimble, I, what are my what are my action items? What do I do I invest more? What do I do? Tell me some of the stuff that I need to do.</p>
<p>21:42</p>
<p>If you're looking to start a business, or if you're looking at,</p>
<p>21:46</p>
<p>like, do I increase my investment in advanced manufacturing? Do I mean like, do all that stuff? What? Sure.</p>
<p>21:53</p>
<p>I mean, you touched a good subject. So we have done bunch of meetings with stuff people like Department of Defense and some other places. So the great theme, behind the scenes is the great onshoring or reshoring of manufacturing into us. Because of all the geopolitical, especially the more recent events as a couple of days ago, people understand kind of the importance of supply chain, because of COVID, because of China, because of what's happening with Russia, you the importance of manufacturing back on us Shores is a big subject. There's a secondary problem, the thing we talked about people is that they're not as worried about opening plants, like putting a plan somewhere in the US, there's plenty of space and plenty of money to probably do that. What they're slightly worried about is people. So where are they going to get the people to work in these plants? And I think this goes back to some of the conversations you're gonna have had in the past, which is, manufacturing is not the default choice for anybody. Like I've talked to high school students and college students. And when you mentioned manufacturing, I think all their thinking is like Charlie Chaplin in modern times in like the 30s, like coming out or running around and turning the screw. And I think manufacturing today is night and day compared to what that was. And it still has this kind of dirty image, kind of like farming today, which is, you know, funny thing is you go to a typical farm these days, and it's basically robots driving tractors and bunch of others. I mean, it's super high advanced technologically super.</p>
<p>23:18</p>
<p>And there's Advanced Chemistry, there's just so much going on. There's like, God, yeah, the,</p>
<p>23:25</p>
<p>you know, like farm yields today, compared to farm yields from 20 years ago are incomparable. So to me, technology and everything else that's in manufacturing, I think it's just kind of neglected stepchild. And I think in general, we don't talk about it, venture capital investment in advanced manufacturing has gone fivefold in just three years. And I think if you look at it a greater interest in this, I think kids out there who are in high school or going to colleges, they should seriously start looking at some of these callings because, as you and I talked, yeah, we cannot, we cannot all be tick tock stars and be in delivery people for DoorDash. Like it's um,</p>
<p>24:04</p>
<p>don't, don't sell yourself short there.</p>
<p>24:07</p>
<p>At some point, people have to do stuff that physically helps the society and you and I have we then we before we started doing this podcast, which is you look at your desk, in your mouse and your mousepad, and your keyboard and your monitor and your pen and your phone. That old came from somebody manufacturing something somewhere. All these things come from a place of somebody had to design it, and then engineer it and figure out which materials to use and how to produce it and that that's kind of the chain that hexagon exists in. And we believe that publicly we as people have to talk about this kind of subjects more. And we have to talk in a sense of augmented manufacturing. What I mean by that is every time somebody presents a future when we factoring it's always a factory with all the robots in it. There's no humans anywhere. And I think that's that's not a reality. The future realistic future is making humans superhuman, so that we can do super poignant, important things and robots do like crappy stuff like, you know, loading boxes, or whatever the story might be. And we end up doing stuff that's much more important than in a bigger scheme of things. But I think in general, we as a nation, or we, as a world have failed in raising the importance of magic of manufacturing, I think that's kind of like you say, What do I say to a young person? Don't just think you can build in a chat app, think that there's other wider implications of what you could do if you go, you know, into the world?</p>
<p>25:37</p>
<p>Yeah, I have to say, it's sad that we were very successful. You know, when I was growing up and going through school, we had, we had shop classes, and then at shop class, I was exposed to how to how to weld how to do certain things, but it was just, I was exposed to it. We don't have that anymore, whatever, for whatever reason, we've done a good job. But the reality exists, many of these manufacturing jobs, it's, I just want to make sure you listeners out there, it's not dirty, it's sophisticated, high end technology. And it's serious. And it's a great career path. It just is.</p>
<p>26:14</p>
<p>And we yeah, we talked to a business owner in North Dakota. And she told us she had a 25% vacancy for robotics engineers, she needed advanced robotics engineers for the for the factory, and she was paying California salaries in North Dakota, obviously, North Dakota in January is not the most pleasant place to be. But when you look at it as a young person, spending five, six years in that environment, learning about robotics, it's very much hands on you learn day to day stuff. That's a transferable skill set that you can take to other places as you kind of grow your your skills. But but because it's a dirty, as you said, because it's viewed as dirty people like oh, I don't want to do that. So they do something else.</p>
<p>26:55</p>
<p>It's I've been very fortunate. And I've been exposed to just an example of where robots are cool. I mean, it's, it's cool. I'm watching the the technician deal with the robot and getting it done, you know, tweaked and done it. Yeah, it's, it's in demand. It's cool. But what's interesting is is do you think, given and this is just a tangent right now. So we've got a, we've got a human challenge, right? We've got an education challenge, because it to your point, I don't think we have a problem citing anything or being able to, you know, put some brick and mortar in the ground, it's always down to the people do you find that maybe our education system is lacks the ability or is nimble enough to be able to keep current with the fast pace of innovation?</p>
<p>27:46</p>
<p>I think it's two things. Like I, I was fortunate enough, but 10 years ago, to do a bunch of work, for example, in Wisconsin, and Wisconsin has a great technical school environment. And there because Wisconsin is one of the most strongest manufacturing states in the US. And seeing that, and actively which Wisconsin education system encourages kids at high school, that technical school is an option. And it's a noble option. You don't have to go to college. And that's the only thing you should do. I think it's this kind of perception of things. And I will quote something that my mom said to me once, which is very controversial, which is he said, some people are meant to be doctors, and some people are meant to be janitors. And what she didn't mean by that is that somehow janitor is a less noble thing to do than being a doctor. She just said, Is there stuff for everybody to do? But we cannot all I think there's a tendency in US education system, to make everybody think that they should all be a doctor or a lawyer. And somehow, if you're less so you are a failure. Yeah, the right thing and everything else. Yeah. And I think we have to reset expectations and tell people, I mean, you know, this yourself, I mean, even during COVID If you're a plumber, you are making $150,000 a year because you need it. People want it today get their stuff fixed. And people are always like, well, a plumber, I don't want to be a plumber. Like that's not a noble thing to do. But at the end of the day, all these colleagues make a decent living, they all serve their function. And I think you have a lot of freedom to do whatever you want to do. And the same goes for manufacturing. And the thing is just we as an education system make a great emphasis on other callings and don't expose the kids to, you know, the wonders of doing practical things with your hands and everything else. I mean, I used to have shop wood shop when I was a kid, like there's no wood shop today. So how are you supposed to learn some of these things. So</p>
<p>29:39</p>
<p>you're spot on and that used to be the highlight of my day and I did go and that wood or or small engine or whatever it might be, but the reality is it's a it's a heavy lift to try to reset expectations and that is sort of a longtail conversation because it has to happen. We have to do it We have to have, you know, companies like hexagon who are committed to that, being able to help that. I think that that's an important. It's, it's important to have that I just think you've got it, we've got to do that, or, or manufacturing as a whole which there was a, I was reading an article, and I can't remember what it was. And there, there are things that that we do that move things forward, like, we're important, you move it forward. And then there's things that you could just, you know, the person, there's things that don't move things forward, manufacturing moves things forward. My history degree doesn't move things forward. Right. And it's just putting that into perspective, what we're talking about here is skills that truly, and positively impact society and move things forward. And that's what's really key.</p>
<p>30:55</p>
<p>Well, I think, yeah, I think it's, I think you're hitting on the right thing, which is, there's a swing and interest. And I think what I mean by that is, you know, people ask, Well, are there more startups in advanced manufacturing? Or is there more people doing things? And the answer is, yes, there's more people using tools like AI and machine learning and everything else to improve the processes in manufacturing. So now, same as people are trying to use AI to solve other problems, they're trying to use the same things to solve problems in manufacturing, to make it more efficient to make a technique. And if you make things more efficient, you're more sustainable, you use less energy, there's all kinds of other implications in investing in technology and advanced manufacturing space. And suddenly, there's a lot more interest, there's a lot more money that's interested in being in this space. And so we need to just capitalize on that part of it, your original conversation, part of it is selfish for hexagon, because we think there's a growth opportunity for Hexagon in that domain that we authentically exist in already and have existed for 20 years. But there's also an opportunity to engage very innovative and interesting companies that will solve really big problems for us. And, you know, we as hexagon, I'm from manufacturing, Intelligence Division, which is manufacturing, but we also do sustainability, we do other things that are out there. And we think that sixth sense will probably over time, expand a little bit as to where we are trying to look for inspiration, but it's all around stuff that is, as you said, more dirty in nature. So</p>
<p>32:22</p>
<p>I'll give you a we're working on some stuff within the utility space, this innovation, this, this conversation that's wrapped around you, it's it's impressive. And, and that message needs to get out and it needs to, there's just so much there too, as well, that could be with mining, that could be with transportation that could be with any of these second innovation. And I'm just telling you right now, if you're, you're frightened about innovation, if you're frightened about dipping your toes into that water, do it. You've got and I think, Milan, you us touched on it briefly and just like you're just in the game, if you're not in the game, if you're not just sort of actively in there, you don't see the opportunities, you don't see the horizon, you don't see what's might happen. You just got to be in it. And you got to find trusted people like Milan and hexagon to at least help you with that journey. Trust big time. It's a human thing. All right, we gotta wrap it up. How do people get ahold you?</p>
<p>33:23</p>
<p>Go to our sixth sense webpage, which is sixth sense that hexagon comm all the stuff is there, kind of if you're interested in getting in touch with me personally, email that's linked there, it goes to my inbox. So if anybody wants to talk to me further about what six cents and what Exxon does, feel free to go there. And we look forward to any further conversation on this.</p>
<p>33:44</p>
<p>That's pretty cool. I really enjoyed this conversation. There's a lot more that can be done. And I'm just telling you right now, we just scratched the surface. Anyway, thank you, Milan, for being on the industrial talk. Ready? Work. Great.</p>
<p>33:55</p>
<p>Thank you very much. Got. All right, listeners, we're</p>
<p>33:57</p>
<p>gonna wrap it up on the other side. If you didn't get that link, it'll be there at industrial talk. So stay tuned, we will be right back.</p>
<p>34:04</p>
<p>You're listening to the industrial talk Podcast Network.</p>
<p>34:13</p>
<p>Alright, once again, a hearty thank you to a Milan for saying yes. And being on the industrial talk podcast. The what always brings excitement to, to me and what we do here at industrial talk is to be able to have these conversations with real individuals that understand that conventional thinking is not a real good way of creating a business that is resilience. So keep pushing. And thank you very much, Milan. I really enjoyed that conversation again. Here we go. IoT solutions World Congress 10th and 12th of may put that on your calendar, but it's just going to be swimming with professionals that truly want to solve problems and and definitely want to collect Every do that IoT solutions work. Alright, stop with the conventional thing. Stop with that legacy thinking. Think different. Push the people. Be brave dare greatly hang out with people like the lawn, you're going to change the world. We're going to have another great conversation shortly right around the corner</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/milan-kocic-hexagonmi/">Milan Kocic with Hexagon Manufacturing Intelligence</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://industrialtalk.com/episodes/milan-kocic-hexagonmi/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://podcasts.captivate.fm/media/342b3835-e760-4091-986a-fff726e41f78/milan-kocic-interview.mp3" length="50868719" type="audio/mpeg" />

			</item>
		<item>
		<title>Richard Ku, Trend Micro and txOne Networks</title>
		<link>https://industrialtalk.com/episodes/richard-ku-with-trend-micro-and-txone-networks-talk-about-cyber-security-network-solutions/</link>
					<comments>https://industrialtalk.com/episodes/richard-ku-with-trend-micro-and-txone-networks-talk-about-cyber-security-network-solutions/#respond</comments>
		
		<dc:creator><![CDATA[Scott MacKenzie]]></dc:creator>
		<pubDate>Mon, 12 Jul 2021 15:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://industrialtalk.com/?post_type=captivate_podcast&#038;p=7825</guid>

					<description><![CDATA[<p>In this week's Industrial Talk Podcast we're talking to Richard Ku with TXOne Network and Trend Micro about "Powerful and Flexible Cybersecurity Network Solutions to Protect your People and Assets".  Get the answers to your "Industrial Cyber Security" questions along with Richard's unique insight on the “How” on this Industrial Talk interview!</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/richard-ku-with-trend-micro-and-txone-networks-talk-about-cyber-security-network-solutions/">Richard Ku, Trend Micro and txOne Networks</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="cfm-player-iframe" style="width: 100%; height: 170px; margin-bottom: 20px; border-radius: 10px; overflow:hidden; border: 1px solid #d6d6d6;"><iframe style="width: 100%; height: 170px;" frameborder="no" scrolling="no" seamless allow="autoplay" src="https://player.captivate.fm/d404452f-a9e7-4a8b-aadc-6c007a3d2483"></iframe></div><p>In this week's <strong><em>Industrial Talk Podcast</em></strong> we're talking to <strong>Richard Ku </strong>with TXOne Network and Trend Micro about <b>&#8220;Powerful and Flexible Cybersecurity Network Solutions to Protect your People and Assets&#8221;</b>.  Get the answers to your &#8220;Industrial Cyber Security&#8221; questions along with Richard's unique insight on the “How” on this Industrial Talk interview!</p>
<p>Finally, get your exclusive free access to the <a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener noreferrer">Industrial Academy</a> and a series on “<a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener noreferrer"><strong>Why You Need To Podcast</strong></a>” for Greater Success in 2020. All links designed for keeping you current in this rapidly changing Industrial Market. Learn! Grow! Enjoy!</p>
<h2>RICHARD KU'S CONTACT INFORMATION:</h2>
<p><strong>Personal LinkedIn: </strong><a href="https://www.linkedin.com/in/richardku1/" target="_blank" rel="noopener">https://www.linkedin.com/in/richardku1/</a></p>
<p><strong>Company LinkedIn: </strong><a href="https://www.linkedin.com/company/trend-micro/" target="_blank" rel="noopener">https://www.linkedin.com/company/trend-micro/</a></p>
<p><strong>TX One Networks Company Website:</strong> <a href="https://www.txone-networks.com/en-global" target="_blank" rel="noopener">https://www.txone-networks.com/en-global</a></p>
<p><strong>Trend Micro Company Website: </strong><a href="https://www.trendmicro.com/en_us/business.html" target="_blank" rel="noopener">https://www.trendmicro.com/en_us/business.html</a></p>
<h2>PODCAST VIDEO:</h2>
<p><iframe loading="lazy" title="Richard Ku with Trend Micro and txOne Networks talk about Cyber Security Network Solutions" width="500" height="281" src="https://www.youtube.com/embed/mGEKjywz6do?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<h2>Other Powerful Cyber Security Resources:</h2>
<p><a href="https://industrialtalk.com/wp-content/uploads/2021/07/TXone-Network-Industrial-Network.pdf" target="_blank" rel="noopener">TXone Network Industrial Network</a></p>
<p><a href="https://industrialtalk.com/wp-content/uploads/2021/07/High-level-and-Endpoint-Solutions-only.pdf" target="_blank" rel="noopener">High-level and Endpoint Solutions PdF Download</a></p>
<p><a href="https://www.trendmicro.com/vinfo/us/security/threat-intelligence-center/internet-of-things/" target="_blank" rel="noopener">https://www.trendmicro.com/vinfo/us/security/threat-intelligence-center/internet-of-things/</a></p>
<p><a href="https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/fake-company-real-threats-logs-from-a-smart-factory-honeypot" target="_blank" rel="noopener">Fake Company, Real Threats: Logs From a Smart Factory Honeypot &#8211; Security News (trendmicro.com)</a></p>
<p><a href="https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/lost-in-translation-when-industrial-protocol-translation-goes-wrong" target="_blank" rel="noopener">Lost in Translation: When Industrial Protocol Translation goes Wrong &#8211; Security News (trendmicro.com)</a></p>
<p><a href="https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/unveiling-the-hidden-risks-of-industrial-automation-programming" target="_blank" rel="noopener">Unveiling the Hidden Risks of Industrial Automation Programming &#8211; Security News (trendmicro.com)</a></p>
<p><a href="https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/security-in-the-era-of-industry-4-dealing-with-threats-to-smart-manufacturing-environments" target="_blank" rel="noopener">Security in the Era of Industry 4.0: Dealing With Threats to Smart Manufacturing Environments &#8211; Security News (trendmicro.com)</a></p>
<p><a href="https://resources.trendmicro.com/Smart-Factory-Success-Story.html" target="_blank" rel="noopener">https://resources.trendmicro.com/Smart-Factory-Success-Story.html</a></p>
<p><a href="https://www.youtube.com/watch?v=mKJomr8HqdQ" target="_blank" rel="noopener">https://www.youtube.com/watch?v=mKJomr8HqdQ</a></p>
<h2>THE STRATEGIC REASON &#8220;WHY YOU NEED TO PODCAST&#8221;:</h2>
<p><a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-content/uploads/2020/02/Why-you-need-to-Podcast-Graphic-2.png" width="1024" height="538" /></a></p>
<h2>OTHER GREAT INDUSTRIAL RESOURCES:</h2>
<p><strong>NEOM</strong>:  <a href="https://www.neom.com/en-us" target="_blank" rel="noopener noreferrer">https://www.neom.com/en-us</a></p>
<p><strong>CAP Logistics:</strong>  <a href="https://www.caplogistics.com/" target="_blank" rel="noopener noreferrer">https://www.caplogistics.com/</a></p>
<p><strong>Hitachi Vantara:</strong> <a href="https://www.hitachivantara.com/en-us/home.html" target="_blank" rel="noopener noreferrer">https://www.hitachivantara.com/en-us/home.html</a></p>
<p><strong>Industrial Marketing Solutions:</strong>  <a href="https://industrialtalk.com/industrial-marketing/" target="_blank" rel="noopener noreferrer">https://industrialtalk.com/industrial-marketing/</a></p>
<p><strong>Industrial Academy:</strong> <a href="https://industrialtalk.com/industrial-academy/" target="_blank" rel="noopener noreferrer">https://industrialtalk.com/industrial-academy/</a></p>
<p><strong>Industrial Dojo:</strong> <a href="https://industrialtalk.com/industrial_dojo/" target="_blank" rel="noopener noreferrer">https://industrialtalk.com/industrial_dojo/</a></p>
<p><strong>Safety With Purpose Podcast:</strong> <a href="https://safetywithpurpose.com/" target="_blank" rel="noopener noreferrer">https://safetywithpurpose.com/</a></p>
<h2>YOUR INDUSTRIAL DIGITAL TOOLBOX:</h2>
<p><strong>LifterLMS:</strong> Get One Month Free for $1 – <a href="https://lifterlms.com/" target="_blank" rel="noopener noreferrer">https://lifterlms.com/</a></p>
<p><strong>Active Campaign:</strong> <a href="https://www.activecampaign.com/?_r=H855VEPU" target="_blank" rel="noopener noreferrer">Active Campaign Link</a></p>
<p><strong>Social Jukebox:</strong> <a href="https://www.socialjukebox.com/" target="_blank" rel="noopener noreferrer">https://www.socialjukebox.com/</a></p>
<h2>Industrial Academy (One Month Free Access And One Free License For Future Industrial Leader):</h2>
<p><a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-admin/wp-content/uploads/2019/10/Industrial-Academy-Graphic.png" width="1024" height="538" /></a></p>
<h2>Business Beatitude the Book</h2>
<p><img loading="lazy" decoding="async" class="alignleft" src="https://industrialtalk.com/wp-content/uploads/2019/10/BB-Book-Cover.png" width="138" height="215" /></p>
<p class="ql-align-center">Do you desire a more joy-filled, deeply-enduring sense of accomplishment and success? Live your business the way you want to live with the BUSINESS BEATITUDES&#8230;The Bridge connecting sacrifice to success. <strong>YOU NEED THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><strong>TAP INTO YOUR INDUSTRIAL SOUL, RESERVE YOUR COPY NOW! BE BOLD. BE BRAVE. DARE GREATLY AND CHANGE THE WORLD. GET THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><a href="https://industrialtalk.com/business-beatitude-reserve/" target="_blank" rel="noopener noreferrer"> Reserve My Copy and My 25% Discount</a></p>
<h2>PODCAST TRANSCRIPT:</h2>
<p><strong>SUMMARY KEYWORDS</strong></p>
<p>deploy, typically, network, industrial, richard, iot, product, solution, devices, environment, talk, scott, endpoint, diagram, important, cybersecurity, provide, business, txOne, traffic</p>
<p>00:04</p>
<p>Welcome to the industrial talk podcast with Scott MacKenzie. Scott is a passionate industry professional dedicated to transferring cutting edge industry focused innovations and trends while highlighting the men and women who keep the world moving. So put on your hard hat, grab your work boots, and let's go all right, again. Welcome to industrial talk. This is where we celebrate you. That's right you I'm putting my pin is pointing right at you, industry hero. You are bold, you are brave, you dare greatly you innovate. You solve problems, you ask the questions. Why not? Well, what if you are the dream makers, you are changing lives and you're changing the world. This very day at this very moment. That's why we celebrate you. Alright, this is number five. In a series we are doing on cybersecurity with Trend Micro, Richard Kuh is always in the hot seat, getting peppered with questions from me. And if you have not checked it out, you've got to look at the other podcasts to this one. It builds. This is where it gets real. This is why this is stuff is important. You in the digital transformation world.</p>
<p>01:16</p>
<p>You better look into this. Alright, let's get cracking.</p>
<p>01:21</p>
<p>Yeah, it gets real. I mean it is it is head if you're saying yourself, Scott, I want to get into that whole digital transformation journey. cybersecurity, Scott, what do I need to do to get in that digital transformation journey? Well, there's a lot of things. And one of them, of course, is a solid, safe, secure environment, and you need solutions. And you're saying to yourself, Scott, but it's complex? Nope. Richard makes it easy. This particular series, this is number five, of course. And we have been on a cybersecurity journey. As you can tell, we've been walking down this path. And just talking cybersecurity, we spoke of cybersecurity threats, sort of laying that foundation. We're talking about the challenges if you're in that digital transformation. That's number two. Number three, we talk about best practice, because you're already cotton, you're saying yeah, I see the threats. Yeah, I see the challenges. What do I need to do best practices? Number four, you need tools? You need things that are just like, yeah, let me plug it in, do this. And I can start on my security journey. Right. And on this particular series, right, number five, we are talking about the hardware we're talking about. Let's just sort of look at my thing here, because I want to make sure that I get this right.</p>
<p>02:49</p>
<p>We have spoken one last week on the endpoint products, right endpoint products. How do we how do we deploy those today? This conversation is network products. Yep. Don't worry. Richard does a great job at differentiating the two. Right? And so you can, you know, go out to industrial talk, you got, we got these great downloads. I mean, we've got these diagrams, you don't have to, there is no reason Trust me. There's no reason why you can't just sit there and go, I got it. I got it. Let me chalk this up there. And here it is. here's a here's a diagram, I'm looking at a diagram. We're going to have all of that out on industrialtalk.com and specifically the one of our network, it's a 1010 Deck diagram with</p>
<p>03:38</p>
<p>TX, one trend, micro, all of the stuff that's right up there. And it's, it's pretty doggone cool. Even I can follow it. And I'm not the sharpest tool in the shed. Now, before we get into this interview, I want to just make sure that you understand industrial talk is going down the road of industrial talk to Dotto, because I have no other word to call it, it's a change. And I want to make sure that you understand we're not just highlighting me and, and and these wonderful professionals. They're going to be videos, there's going to be articles, and it's going to just be across the board not coming from me but coming from industry, industry leaders who are at the cutting edge, you just go there and then springboard wherever you want to go. If you want information, the latest and greatest information brought to you in a way that All right, this is pretty cool. Industrial talk, the the new one is where you want to go. Trust me, you do want to go there. The number two part is that</p>
<p>04:38</p>
<p>we have this industrial Academy, then we're going to put all this stuff out there on industrial Academy to and what we have come up with is a sort of show, you know share it forward or or give it forward or whatever that that term is, but from an educational perspective to communities and organizations that are in need of what we</p>
<p>05:00</p>
<p>These leaders bring to the marketplace, they've got to learn education changes, education changes lives. It's the bottom line. And we have to collaborate, we have to come together to, to share and be able to provide this wonderful information that is, is available out there. Go to industrial talk, be a part of that effort. Because there are a lot of people, a lot of communities, a lot of countries around the world that would greatly benefit from your insights. And if you want to be an instructor, if you want to share your knowledge, the industrial Academy is where it's at. We'd love to have you on that Academy so that we can help the world from an industrial education perspective. Don't get off tinkly. about that. I know I do. I do. You guys have got it. industry can change the world and change lives. That's the bottom line. All right, let's get on with the interview.</p>
<p>06:03</p>
<p>Well, let's say the series a continuation of the series. Once again, this is network stuff. This we've talked about endpoint, we've got a series out there it is a must sort of consume, and re consume it. Get this stuff, right. Okay. So out on industrial talk, we're going to have this deck, it's going to be in PDF form. and download it, see it, grab it, learn it, listen to Richard, reach out to them, reach out to th one reach out to Trend Micro you will not be disappointed. Alright, let's get going. Enjoy the interview. All right, Richard, welcome back to industrial talk. Now, listeners, this is an important conversation. We're talking cyber security. We're talking we we've laid the foundation, we have a number of cybersecurity related related topics for you to consume. And this one is we're talking about now that we've recognized the the challenges that exist out there, we need solutions, we need solutions to be able to deploy. And that's this particular conversation now, Richard, thank you again, as always, for joining industrial talk, how you doing?</p>
<p>07:13</p>
<p>Good. Thank you, Scott. Good to be back. And I'm happy for for you and your family. Why? Thank you very much, I appreciate that back at you. Absolutely. back at you. Now, let's, let's let's level set, let's talk about products, because we can all talk about the challenges that exist out there, but we need to put something into action. And that's where we're talking about products and solutions that Trend Micro and TX one networks provide? So at our last episode, can you sort of sort of lay out the difference between it OT and all of that good stuff, so that the listeners sort of get oriented?</p>
<p>07:53</p>
<p>Yeah, so you know, I think, as we speak many time, right? You know, one of the big changes in this digital transformation is the convergence of the it OT, and in order for us to provide, you know, a clear guideline for our customer and our partner, you know, we need to kind of define what is, you know, IoT device versus ot devices? Right. And so that's clear. So, you know, I did typically, you know, from my experience, you know, on the IT environment, typically, most of these are multi purpose system and designed to do multiple things like maybe running Microsoft Office, right, or doing some kind of video conferencing, right, or, you know, then this typically on it, so I usually have the latest and greatest version of the operating system. They require internet connectivity for tasks to be complete, right, and they have a higher tolerance for, you know, interruption or latency. And, you know, I think, you know, on the, you know, it side, people typically look at confidentiality as kind of their priority, right. But when you look at the OT environment, the system are typically, you know, mission critical, I carry maybe a single task or, you know, carrying, you know, maybe the tasks are both the productivities, as well as the</p>
<p>09:19</p>
<p>ability of the system is got low tolerance for, you know, interruption and latency, because they have been around for years and decades. And they're designed to do you know, one task, right. And so any type of performance impact would be a big challenge. You know, some of the system on the OT environment are typically air gapped, right? They have no internet connectivities and update in patches, right? Typically doesn't happen, you know, often right? And they have to be on a schedule maintenance in order for them to do any updates or patches. And, you know, I think availability and safety is kind of the priority, right for many</p>
<p>10:00</p>
<p>This organization on the OT side, right, so on a high level, I think those are kind of distinction between the it OT, and then when you go down to the, you know, product level last year was a podcast, we talked about our employee product. And these are, you know, you know, typically designed for employees that have issues deploying, let's say, a conventional, you know, you know, anti malware or security solution, because, you know, these environments are typically your legacy, and in tenant for doing your single task, and the resources are limited, and they have no internet connection. So you need a special type of endpoint solution that's designed for those. And that's what we talked about on the last, you know, basically podcast, right? Now, let's shift gear to the networking product, right. The networking product, typically, you know, you know, what we have here is are designed to address some of the challenges in you know, OT networks, and that will be happening when you have kind of like a big flat networks without proper segmentation, or you have a lot of unpatched protocol or vulnerability protocols or on you know, depend also as you know, a lot of unpatched, you know, say, devices, right, that you need to address. And, you know, also, you know, someone in our network environment typically have weak authentication, right, and non encrypted communication, you know, between different devices. Right. So, that's what the network product is designed to address. So as endorser diversity to different the type of solution that we have, let me ask you this question.</p>
<p>11:52</p>
<p>Just to find for the listeners out there, what do you mean by big flat networks?</p>
<p>11:59</p>
<p>Well, I've got traditionally, right, you have, I would say, you know, on the OT side, you have people, you know, building the networks, and just the hiring pieces to arrive and not, not really well design or structure. And so you're gonna have basically system device everywhere, but what are our say, architect well into that environment, so you can see a very flat network like that, and it's more challenging to address because they're everywhere. Right? Thank you that that, that makes complete sense. Now, let's start talking about now that you've identified that big flat network, you identify the challenges associated with an ad just, that's, that's pretty much all businesses out there, they just sort of evolve and grow as, as business needs. That's a mad right. So let's talk a little bit about how we can sort of secure that big flat network.</p>
<p>12:58</p>
<p>Yes, so, you know, within a network product or solution that we have, we have a total of,</p>
<p>13:06</p>
<p>you know, four products that is designed for that kind of environment, right. And so, the very first product we have is called the edge IPS. And these are basically a single segment and then designed to address a darkened environment and they typically, you know, think this system about 300 megabit per second, just, you know, now analyze the traffic and it's very versatile and can be deployed easily. And you know, the hrps itself can also provide some level of IP and protocol whitelisting in there, it can be deployed in a harsh environment, and we also provide you know, your virtual patching right onto the device itself. And it is how we bypass right. So, this is kind of our single segment, edge IPS product or the next level product</p>
<p>14:01</p>
<p>is called the edge fire. And this is basically is a tool</p>
<p>14:07</p>
<p>when, and you know, I was a VLAN interface, and it can help you to you know, do some level of micro segmentation, right, and it can also be deployed on a harsh environment, or it also include currently virtual patching, and you know, if you like, right, you know, typically we have this convergence between it or, or even like, say, at the shop floor, or let's say in a manufacturer, you can actually put a, you know, between East and West traffic protection, right. So, it's got some,</p>
<p>14:40</p>
<p>you know, network access, you know, you know, I think control in there and you know, nit in firewall capability. So this is kind of our hrps right, and then the next level of the product we have is the edge IPS probe. This is a system or network device that have</p>
<p>15:00</p>
<p>1224 and 36 and 48 segments, you can deploy to the current environment when you know, and they typically they are about 10 gigabit per second to, you know 20 gigabit per second. So it's a high performance, you know, you're in the system right and it allows you to basically can deploy an interstate between East and West traffic or maybe north and south traffic, but in</p>
<p>15:28</p>
<p>this particular edge IP is broken help you to basically cry on a network, you know, do you do like a network segmentation is got its own dedicated in the management port. And you know, it also provided a virtual patching, audit from programmable hardware bypass are also included, and it can be deployed like to say on East West traffic. Very good. And I got</p>
<p>15:54</p>
<p>I got an interrupt here, when we start talking about east west, north south traffic, what do you mean by that?</p>
<p>16:01</p>
<p>Yeah, so typically, when you have this convergence, right, between</p>
<p>16:05</p>
<p>God, right, and, you know, you know, and that's what we call it on the east and west traffic, right, you know, maybe the old ci ci will be kind of your web traffic and kind of your it sites to ease traffic in between, right, you might have a DMZ zone, right. And that's where we call, you know, East West traffic. And then I did on the previous</p>
<p>16:29</p>
<p>I think, you know, podcasts that we did, I talked about the iisa, you know, IEC 62443,</p>
<p>16:39</p>
<p>you know, reference model, a lot of people call it the producer model, right. And when you look at, you know, that kind of architecture or reference architecture, used, you know, you know, organization typically layout, you know, the gen network architecture, from a level zero, level one, level two, level three, and a in to the enterprise environment and the different level, that's what we call the north south traffic, because you have a device talking to maybe a PLC, and an HDMI machine was on a SCADA system, right? So that's that level is called what we call the north south traffic, and then between it OT, that's what we call east and west traffic. All right, very good. I had to ask the question, because I'm sitting there thinking to myself, What do you mean by that, but now it's, so listeners, we're gonna have the the diagram, when he starts talking about north south, we talk about level 123, and so on, there's a good diagram that is, will be available. And then of course, East West, it OT and all of that convergent, which is an important component that don't don't gloss over it. That's that's important, too. All right. Now, we know what you guys got. Maybe I got the audience. Oh, you want to?</p>
<p>17:59</p>
<p>Yeah, I can we can share that reference architecture.</p>
<p>18:04</p>
<p>We want on that.</p>
<p>18:06</p>
<p>podcast right now. All right, listeners, we're gonna be sharing it as we speak, right, as we speak.</p>
<p>18:14</p>
<p>All right, here it is. If you're out there on video, you'll see it if you're out there on podcasts, we'll go to the video because you won't be able to see it on a podcast. So here we go. We've got the diagram. Take us through it again there, Richard.</p>
<p>18:30</p>
<p>Yeah, so this is, you know, it typical, our, say, reference architecture that I put together. And I take into account on the left side is the OT networks, right? This is the, you know, OT environment, and on the right side, which is the information technology environment, right. And that is what your traditional IT environment on the top is kind of your cloud and virtualization or, you know, what I call the connected world,</p>
<p>19:00</p>
<p>you know, for the cloud. And so when you look at this environment, you can see there is a bridge, right, or a DMZ zone between it on the right side, and then the old T on the left side, right, and this what I call the currently where you can deploy some of the edge IPS pro in that area. And this is kind of what we call the east and west traffic, and then the different levels from level zero, you know, 123 and four, into the cloud, right? And that's kind of what we call it because I know it's out, you know, traffic. And that's where you can deploy some of our solution, you can deploy as a one to one relationship as a maybe putting ntps in front of a PLC. Or you can deploy, let's say an edge IPS Pro, right in front of whole level or the whole segment, right. And so that's what we call the north and south traffic. So hopefully that kind of cleared up a little bit. cleared it up for me, and I'm the most important person on this pocket.</p>
<p>20:00</p>
<p>Just kidding, don't don't even die. I don't want to hear any email saying, Scott, That's not right. All right, let's go into. So we have right now we have the the, we've talked about edge IPS, we've talked about edge fire, we spoke about edge IPS Pro, we talked about one to one, one to many relationships. And, and that's all great, that's all good. But I need to see this information, I need to understand what's taking place, what type of solutions do you have out there for that? Right. So, you know, with all those different products, as you meant, it is very challenging, right for customer and you know, partner to have visibility into, you know, all the different devices that they have, you know, what type of threat is being detected, what type of protocol they are, you know, we are intercepting. And so, you know, we also develop a, you know, a product called key defense counsel, right, and this can support up to 1000, network segmentation, right. And it provide basically, a centralized management for you to, you know, have better visibility into all different threats that come into your environment, and, you know, whatever activity is there, and what type of threat that we detect. And but also it gives you the ability to basically Central, basically, deploy security policy, right, and, you know, the latest signatures or rules across Samsung device, right. And, you know, like, a lot of challenges and a lot of people have is, you know, all the different shadow ot or the different devices coming through, right? How do you have visibility into production environment. And so this Management Console also give you that level of visibility across all your audio devices. And it can be integrated with your let's say, you know, a third party, same platform, right, if you have your own SOC, and you want to be able to integrate all the train record, you know, gx one networks, solution into the SIM, we can send all those log orders, you know, threat intelligence directly from our console into the sim so that people can have now a corporate wide visibility across both the IT side, and OTS are on the same. So this is something that we can provide using this central management product called the old key defense counsel. Okay, so I stick my business hat on, I recognize the necessity to have a robust cybersecurity strategy. You've mentioned, three products that are out there, OT environment, whatever it might be. And then of course, you got the Council, the console, excuse me, that allows us to sort of take a greater look at all of the data and all the information and be able to be proactive in our action.</p>
<p>23:03</p>
<p>What, where do I even start? Okay, you got the edge IPS, you've got the edge fire, you've got the edge IPS Pro, you got the console? Where do I start?</p>
<p>23:15</p>
<p>Yeah, so that's a very good question, Scott. And typically,</p>
<p>23:20</p>
<p>you know, many of our customers, you know, come to us, right. And, you know, we will basically, you know, talk to them about some of the business and technical challenges they have. And we'll try to assess what kind of environment they have, what what type of, you know, issue they have, and then we will provide the right recommendation, you know, to them, right, and, and also the level of comfort that they might have, for example, you know, some organization may not want to deploy, you know, the complete solution, or what we call the defense in depth solution, right, from endpoint all the way up to the cloud. And in the network, in everything in between, you know, what some people typically do is they say, Hey, you know, what, I have, you know, HDMI machine running Windows XP is and has been around for decades and don't have a lot of patch of vulnerability, and we got a lot of vulnerability, what can you guys do to help us and so we'll assess that kind of use case, and then we will provide the right offering to address that simple inability Hmm, machine, you know, for in this case, it would be a stellar one, you know, still in force or sell or protect, right. So, that can certainly typically happen quite a bit. But we will help the customer through that journey to get the right product into the right environment, and also the level of comfort that they might have. I like the term journey because, for me, if I had my business hat on, I would be overwhelmed. I would, I would know one side that there are challenges that exist within the cyber security</p>
<p>25:00</p>
<p>space in my business. And again, I don't know where to go, I don't know where to start, I don't know where to take my first step. And it's it's imperative that I have a relationship with an organization that can guide. Do I have to? Can I do it incrementally Do I have to make? I mean, you've got so many wonderful products. Can I do it incrementally? The Big Bang? What what? What's the recommendation?</p>
<p>25:28</p>
<p>Yeah, so I think, as I mentioned, right, is really depend on the comfort level of the customer, you know, as we all know, right on the OT environment, or traditional, you know, these devices never have any security built in or security does not get play a very important role. And so many organizations tend to kind of, you know, I will say, deploy a solution like this smaller, incremental, you know, why, right. So, you know, last, you know, I will say, you know, episode, we talked about the different endpoint, right. And so, you know, for example, if you just want to start with scanning all the contracted machine, right only first, before they do any kind of maintenance on my PLCs, or my network, OT networks, you could just get a product called portable security, right, or you just do the scanning of all the contracted machine before you come in, right. And then that will be kind of maybe the simplest and easiest way to start. And then you might go to the next stage, right, where you say, now I feel a little bit more comfortable, let me put something in a, let's say, my Windows XP machine, because they haven't been able to get any patches have been vulnerable, and we're just worried and concerned, then you can go to next step where you deploy all your stellar, protect or enforce into that environment, right? So yes, you have the option I and you know, to basically deploy them incrementally, or you can deploy everything really up to your comfort level. And that's what we're here to, to kind of here to help you to go through that process. And make sure we make you feel comfortable. And then you can deploy the solution. And typically, the customer also will kind of go through the proof of concept, right? Make sure that they feel very comfortable before they actually deploy. So so all those options are available to the customer. I think it's important, I think this is a vital conversation.</p>
<p>27:31</p>
<p>In given the speed, just like anything else, even this digital transformation journey that we've been talking about and the necessity to to deploy proper cybersecurity, it's moving fast as well. And just like cybersecurity, it's moving fast as well. This is this is a subject and topic and relationship that needs to be nurtured. Because you can't do this on your own, you need</p>
<p>27:55</p>
<p>companies like Trend Micro TX one networks, to be able to develop that relationship, because just telling you right now, for me, personally, I get nervous, I get nervous when I hear things like that. And that means I want to look for strategic partners to be able to have great conversations to make sure that that my business is secure. How would somebody get ahold of you there Richard?</p>
<p>28:17</p>
<p>Yeah, so, you know, all these different solutions are just talked about right there are endpoint solution or networking products, right, they are readily available through all our channel partners right turn micro is very much you know, a channel company so we actually sell the market orders back to our channel policy, you can reach out to your channel partners for you know, recommendation and guidelines on how to get access to some of these products. Or you can reach when you go to our website to get a little bit more information on it@www.trendmicro.com or you can also go to our TX one network their website and you can find more information. And if you want to reach out to me, you can email me at Richard underscore k u at when Microsoft COMM And I'm happy to answer any questions you might have you related to some this particular product we just mentioned, this is more of a very high level. And if you want a more deep dive, then you know we'll set up a call and we'll walk through this product for you. Alright listeners, there's no excuse. You have all the contact information. This is an important topic. This is an important solution. This is important for your business and the integrity of your business. Reach out to Richard and team Trend Micro very important. Do not hesitate. They'll they'll they'll help you through it and hold your hands because they they've been through it and this is a very, very important. Richard, thank you very much for joining again, industrial Talk.</p>
<p>29:52</p>
<p>Thank you, Scott. All right, listeners. We're gonna wrap it up on the other side. All the contact information will be out on industrial talk as well as</p>
<p>30:00</p>
<p>All of the presentations, everything that you need to get this thing rolling will be out there. Thank you very much. Stay tuned. You're listening to the industrial talk Podcast Network.</p>
<p>30:17</p>
<p>All right, this is once again, it gets real here. This is cybersecurity. This is a series this is number five in a hopefully expanding series, because this topic is absolutely important. And must, must be shared with the globe. Alright, Richard knocked it out of the park. Again, that works. Alright. Again, I want you to hear me out.</p>
<p>30:43</p>
<p>What you have inside your head is important. And it can change lives. If you're an industry. The industrial Academy is for you. I want I want to encourage you to reach out to me and say, Scott, I want to be a part of that great. And I want to be able to share that education with the world. That's what this whole beautiful digital world that we live in. You can change lives. You can transform lives, you can definitely create dreams. You are bold, you are brave. You dare greatly hang out with people who are bold and brave and daring greatly.</p>
<p>31:16</p>
<p>Nothing could stop you. All right, we're gonna have another great, hopefully, cybersecurity interview right around the corner.</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/richard-ku-with-trend-micro-and-txone-networks-talk-about-cyber-security-network-solutions/">Richard Ku, Trend Micro and txOne Networks</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://industrialtalk.com/episodes/richard-ku-with-trend-micro-and-txone-networks-talk-about-cyber-security-network-solutions/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://podcasts.captivate.fm/media/defcb0bb-9d23-46e4-81f8-e64684934927/tm-podcast-5.mp3" length="40779239" type="audio/mpeg" />

			</item>
		<item>
		<title>Richard Ku with Trend Micro and txOne Networks talk about Cyber Security Endpoint Solutions</title>
		<link>https://industrialtalk.com/episodes/richard-ku-with-trend-micro-and-txone-networks-talk-about-cyber-security-endpoint-solutions/</link>
					<comments>https://industrialtalk.com/episodes/richard-ku-with-trend-micro-and-txone-networks-talk-about-cyber-security-endpoint-solutions/#respond</comments>
		
		<dc:creator><![CDATA[Scott MacKenzie]]></dc:creator>
		<pubDate>Fri, 09 Jul 2021 15:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://industrialtalk.com/captivate-podcast/richard-ku-with-trend-micro-and-txone-networks-talk-about-cyber-security-endpoint-solutions/</guid>

					<description><![CDATA[<p>In this week's Industrial Talk Podcast we're talking to Richard Ku with TXOne Network and Trend Micro about "Endpoint Solutions that Secure Legacy Systems and Systems with No Internet Connectivity".  Get the answers to your "Industrial Cyber Security" questions along with Richard's unique insight on the “How” on this Industrial Talk interview!</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/richard-ku-with-trend-micro-and-txone-networks-talk-about-cyber-security-endpoint-solutions/">Richard Ku with Trend Micro and txOne Networks talk about Cyber Security Endpoint Solutions</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="cfm-player-iframe" style="width: 100%; height: 170px; margin-bottom: 20px; border-radius: 10px; overflow:hidden; border: 1px solid #d6d6d6;"><iframe style="width: 100%; height: 170px;" frameborder="no" scrolling="no" seamless allow="autoplay" src="https://player.captivate.fm/1d91e381-12f9-4f33-bd7b-3e164231d099"></iframe></div><p>In this week's <strong><em>Industrial Talk Podcast</em></strong> we're talking to <strong>Richard Ku </strong>with TXOne Network and Trend Micro about <b>&#8220;Endpoint Solutions that Secure Legacy Systems and Systems with No Internet Connectivity&#8221;</b>.  Get the answers to your &#8220;Industrial Cyber Security&#8221; questions along with Richard's unique insight on the “How” on this Industrial Talk interview!</p>
<p>Finally, get your exclusive free access to the <a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener noreferrer">Industrial Academy</a> and a series on “<a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener noreferrer"><strong>Why You Need To Podcast</strong></a>” for Greater Success in 2020. All links designed for keeping you current in this rapidly changing Industrial Market. Learn! Grow! Enjoy!</p>
<h2>RICHARD KU'S CONTACT INFORMATION:</h2>
<p><strong>Personal LinkedIn: </strong><a href="https://www.linkedin.com/in/richardku1/" target="_blank" rel="noopener">https://www.linkedin.com/in/richardku1/</a></p>
<p><strong>Company LinkedIn: </strong><a href="https://www.linkedin.com/company/trend-micro/" target="_blank" rel="noopener">https://www.linkedin.com/company/trend-micro/</a></p>
<p><strong>TX One Networks Company Website:</strong> <a href="https://www.txone-networks.com/en-global" target="_blank" rel="noopener">https://www.txone-networks.com/en-global</a></p>
<p><strong>Trend Micro Company Website: </strong><a href="https://www.trendmicro.com/en_us/business.html" target="_blank" rel="noopener">https://www.trendmicro.com/en_us/business.html</a></p>
<h2>PODCAST VIDEO:</h2>
<p><iframe loading="lazy" title="Richard Ku with Trend Micro and txOne Networks talk about Cyber Security Endpoint Solutions" width="500" height="281" src="https://www.youtube.com/embed/6Awcnia5OXo?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<h2>Other Powerful Cyber Security Resources:</h2>
<p>High-level and Endpoint Solutions PdF Download:  <a href="https://industrialtalk.com/wp-content/uploads/2021/07/High-level-and-Endpoint-Solutions-only.pdf" target="_blank" rel="noopener">https://industrialtalk.com/wp-content/uploads/2021/07/High-level-and-Endpoint-Solutions-only.pdf</a></p>
<p><a href="https://www.trendmicro.com/vinfo/us/security/threat-intelligence-center/internet-of-things/" target="_blank" rel="noopener">https://www.trendmicro.com/vinfo/us/security/threat-intelligence-center/internet-of-things/</a></p>
<p><a href="https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/fake-company-real-threats-logs-from-a-smart-factory-honeypot" target="_blank" rel="noopener">Fake Company, Real Threats: Logs From a Smart Factory Honeypot &#8211; Security News (trendmicro.com)</a></p>
<p><a href="https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/lost-in-translation-when-industrial-protocol-translation-goes-wrong" target="_blank" rel="noopener">Lost in Translation: When Industrial Protocol Translation goes Wrong &#8211; Security News (trendmicro.com)</a></p>
<p><a href="https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/unveiling-the-hidden-risks-of-industrial-automation-programming" target="_blank" rel="noopener">Unveiling the Hidden Risks of Industrial Automation Programming &#8211; Security News (trendmicro.com)</a></p>
<p><a href="https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/security-in-the-era-of-industry-4-dealing-with-threats-to-smart-manufacturing-environments" target="_blank" rel="noopener">Security in the Era of Industry 4.0: Dealing With Threats to Smart Manufacturing Environments &#8211; Security News (trendmicro.com)</a></p>
<p><a href="https://resources.trendmicro.com/Smart-Factory-Success-Story.html" target="_blank" rel="noopener">https://resources.trendmicro.com/Smart-Factory-Success-Story.html</a></p>
<p><a href="https://www.youtube.com/watch?v=mKJomr8HqdQ" target="_blank" rel="noopener">https://www.youtube.com/watch?v=mKJomr8HqdQ</a></p>
<h2>THE STRATEGIC REASON &#8220;WHY YOU NEED TO PODCAST&#8221;:</h2>
<p><a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-content/uploads/2020/02/Why-you-need-to-Podcast-Graphic-2.png" width="1024" height="538" /></a></p>
<h2>OTHER GREAT INDUSTRIAL RESOURCES:</h2>
<p><strong>NEOM</strong>:  <a href="https://www.neom.com/en-us" target="_blank" rel="noopener noreferrer">https://www.neom.com/en-us</a></p>
<p><strong>CAP Logistics:</strong>  <a href="https://www.caplogistics.com/" target="_blank" rel="noopener noreferrer">https://www.caplogistics.com/</a></p>
<p><strong>Hitachi Vantara:</strong> <a href="https://www.hitachivantara.com/en-us/home.html" target="_blank" rel="noopener noreferrer">https://www.hitachivantara.com/en-us/home.html</a></p>
<p><strong>Industrial Marketing Solutions:</strong>  <a href="https://industrialtalk.com/industrial-marketing/" target="_blank" rel="noopener noreferrer">https://industrialtalk.com/industrial-marketing/</a></p>
<p><strong>Industrial Academy:</strong> <a href="https://industrialtalk.com/industrial-academy/" target="_blank" rel="noopener noreferrer">https://industrialtalk.com/industrial-academy/</a></p>
<p><strong>Industrial Dojo:</strong> <a href="https://industrialtalk.com/industrial_dojo/" target="_blank" rel="noopener noreferrer">https://industrialtalk.com/industrial_dojo/</a></p>
<p><strong>Safety With Purpose Podcast:</strong> <a href="https://safetywithpurpose.com/" target="_blank" rel="noopener noreferrer">https://safetywithpurpose.com/</a></p>
<h2>YOUR INDUSTRIAL DIGITAL TOOLBOX:</h2>
<p><strong>LifterLMS:</strong> Get One Month Free for $1 – <a href="https://lifterlms.com/" target="_blank" rel="noopener noreferrer">https://lifterlms.com/</a></p>
<p><strong>Active Campaign:</strong> <a href="https://www.activecampaign.com/?_r=H855VEPU" target="_blank" rel="noopener noreferrer">Active Campaign Link</a></p>
<p><strong>Social Jukebox:</strong> <a href="https://www.socialjukebox.com/" target="_blank" rel="noopener noreferrer">https://www.socialjukebox.com/</a></p>
<h2>Industrial Academy (One Month Free Access And One Free License For Future Industrial Leader):</h2>
<p><a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-admin/wp-content/uploads/2019/10/Industrial-Academy-Graphic.png" width="1024" height="538" /></a></p>
<h2>Business Beatitude the Book</h2>
<p><img loading="lazy" decoding="async" class="alignleft" src="https://industrialtalk.com/wp-content/uploads/2019/10/BB-Book-Cover.png" width="138" height="215" /></p>
<p class="ql-align-center">Do you desire a more joy-filled, deeply-enduring sense of accomplishment and success? Live your business the way you want to live with the BUSINESS BEATITUDES&#8230;The Bridge connecting sacrifice to success. <strong>YOU NEED THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><strong>TAP INTO YOUR INDUSTRIAL SOUL, RESERVE YOUR COPY NOW! BE BOLD. BE BRAVE. DARE GREATLY AND CHANGE THE WORLD. GET THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><a href="https://industrialtalk.com/business-beatitude-reserve/" target="_blank" rel="noopener noreferrer"> Reserve My Copy and My 25% Discount</a></p>
<h2>PODCAST TRANSCRIPT:</h2>
<p><strong>SUMMARY KEYWORDS</strong></p>
<p>trend micro, solution, network, product, industrial, richard, environment, reference architecture, system, cybersecurity, endpoint, podcast, listeners, protect, security, update, cloud, tx, machine, talk</p>
<p>00:04</p>
<p>Welcome to the industrial talk podcast with Scott MacKenzie. Scott is a passionate industry professional dedicated to transferring cutting edge industry focused innovations and trends while highlighting the men and women who keep the world moving. So put on your hard hat, grab your work boots, and let's get all right. Again, thank you very much for joining industrial talk. This is a continuation of our cybersecurity focus, our cybersecurity content training brought to you by those wonderful people at Trend Micro, they absolutely know what they are doing. And if you don't think that cybersecurity and managing those threats is not important, there was another ransomware event news out there. Let's get cracking. Yeah, again, this is much. And I think what I've seen in this particular conversation is one, if we can make the protection and of your systems that exist today, sort of seamless, painless, all of that good stuff better for you. Trend Micro is going down that road. Alright, this is number four in a series of, we're gonna have six now this is number four. And we had cybersecurity threats. gotta listen to that one. Absolutely great. And then podcast number two industrial businesses and technical challenges as you go through this digital transformation journey. A must cybersecurity best practices. So we're all saying there are threats. There are challenges. There are best practices, right? That's our series. Today, we're going to be talking about getting into the products, you just can't just have this conversation, you've got to have solutions. You've got to have concrete, doggone solutions to be able to secure your network, get work done, make it safe, do everything you possibly can and and prevent bad people getting into your your network. So what we're going to be talking about is endpoint products and solutions on this particular podcast. The next one after this, we're going to be talking about network products. Okay. And then hopefully, we'll get the CEO of Trend Micro talking about what that future looks like. What are the challenges that exist? What are the opportunities, it's bright, secure, all that good stuff. So on this one, Richard Kuh, again, going to be knocking out of the park going to be talking about endpoint solutions. And I'm telling you, man, this is cool stuff. They've got a great, great solution out there solutions with an S you can hear my ass in that one. All right, enjoy of this episode. Richard, welcome back to industrial talk. Now, listeners. This is podcast, and video number four. The other three, you have to you have to look into them, you have to find them. podcast number one, we talked about cyber security threats, challenges and risks. That is podcast number one, podcast number two included industrial business, and technical challenges for you businesses out there that are going down that digital transformation journey. The other number three was cybersecurity best practice, big time, go out to industrial talk att.com. And you will find great links into those standards for you as a company going down to that digital transformation. Now, what we're going to be covering on this particular podcast number four is industrial cybersecurity solutions that are provided by Trend Micro and I think what we're going to do for this one, so that if you're, if you're looking at the video, we're going to share some slides. If you're out there on podcast world, you're just going to have to find the video, but we're going to do the best we can to explain what the network looks like. And we're going to segregate it into two, one, an endpoint solution. And then the next podcast what we're going to do is we're going to talk about networking solutions. Richard, did I cover it right? Yeah, Scott. Looks like we're right on it. All right. All right. Let's, for the listeners out there. We've talked about a lot of cybersecurity stuff. We've talked about the market out there. We've talked about the environment. We've talked about pretty much everything that you could possibly make. Now we're sort of getting into the nitty gritty Richard, we're getting into the real, you know, hardware, the stuff that needs to be put into practice and in input on your network. Give us a little high level overview of the product lines and the solutions you have.</p>
<p>04:58</p>
<p>But Thanks, Scott, so much. I think over the last, you know, several podcasts, we talk about the risks, right, we talk about the challenge, and also we talk about some best practice. Now on this particular podcast, we're going to focus very much on some of the new, you know, industrial console cybersecurity for on trend, micro and TX one networks, right. And so, as you mentioned, we're going to cover in two section, one section is going to be about the endpoint. And then of course, the networking product. But specifically on a high level, you know, one of the things that I typically recommend to the customer and many of the partner is that, if you have a chance, right, go and look at the reference architecture for you know, from is a 99, or some people call it the Purdue reference architecture, right. And in that particular reference architecture, or, you know, basically, they organize a struct in such that you have an operational technology environment, and then you have an information technology environment and a VR cloud. So maybe if I can share, Skype absolutely makes it for me to share now. Yeah, absolutely. Right. So here is basically kind of our recommendation cybersecurity for industrial control environment. And this is kind of our defense in depth, you know, offering, right and as I mentioned, this is a high level flash reference architecture, I design I put it together. So on the left side is your typical reference architecture for ot environment, right. And as the, you know, Purdue model, as you can see, in there, you have different level, or you know, from starting from the level zero, level one, level three, to level three. And then of course, you have the connected world, or this is what we call a cloud, you know, environment. And so on the operational technology environment, you have the low level zero, this way, you have all the sensor, all the devices, right, and then the next level level one is to connect all your control networks, like your PLC your to your DCs system, right. And then next level two is kind of your supervisory network, right, this is where you see all the different, you know, Asian machines, the status system and stuff in that, right, and then that next level, our three, this is kind of your operational and your control, network environment. And typically, this is where you have all the, you know, your traditional universes, you know, up to date, latest, greatest, you know, Windows or Linux or, you know, VMware environment, right, and this guy very much happy to on that operational side. And so this is kind of how we see many organizations structure, their ot environment, and the on the right side is your traditional enterprise, you know, information technology, or IT infrastructure, but we're not going to talk about that. And then, of course, you know, last but not least, on the very top, you know, we talk about the connected world, or this is kind of your cloud environment, right. And if you are going through that transformation, and you're leveraging the different cloud, you know, the public cloud environment that you do want to secure those as well. So, this is going to be a high level on the very left side, right, these are additional, you know, I would say environment that we also typically recommend customer to protect, because you do have a lot of contractors coming in to your lab and perform kind of maintenance or updating, we want to make sure those those contractors are secure right. So on a very high level, this is kind of our reference architecture. Now, from a solution perspective,</p>
<p>08:57</p>
<p>let me let me let me let me on. So listeners, what we have is we have a slide and the slide has multiple levels and the various security that is necessary for those levels. I think that because we're going down the cloud that's important that is a part that is also a part of that digital transformation journey. And then of course, specially today you have a lot of contractors coming on, on on your network and and and that is very important to be able to protect your, your overall network. And that's why trend micros got a great product for you now. Richard, will I will the listeners be able to download this particular slide from industrial talk?</p>
<p>09:44</p>
<p>Yes, I think what we will do is I will share this couple of this live with us you can you know, make that available to the listener as well.</p>
<p>09:52</p>
<p>Good. Okay, proceed. Oh,</p>
<p>09:55</p>
<p>yeah. So as we discussed, right, you know, at the lowest level level, zero and level Want to read this is typically all the sensors and devices. And, you know, traditionally, I think it's very difficult, you know, to put any kind of security there, if it's already been developed and already put in place. However, if you are, you know, saying building this device, you know from the ground up, then there is offering out there right from Trend Micro where we provide a set of binary or security SDK that you can actually take this binary and bake right into your device itself, right. So this is the product, we call Trend Micro IoT security solution. And it's available there as well. And then as you move to level two, right, this is where all your PLC, or DCs system and your RTU, right, this is where you have different cables, from Trend Micro, you know, for example, you can have our hrps, right, and that can be set in front of your PLC, or DCs, make sure that all the traffic coming in out of the networks, you know, that device up, check is and make sure that it is not have any kind of bad things coming through or going out, right. So that's kind of the level two, or level one. And level two, you have, you know, all the difference scalar system or the HDMI machine. These are typically, you know, Windows seven or Windows XP, right, it's been around for who knows, in decades and haven't been update or Microsoft patches, right. And so, we do have a couple products here, you know, one of the product we recommend highly is a product called stellar protect, and this is a lockdown whitelisting solution. And we'll talk about a little bit more in some of the use case. And then of course, if you move to the color, the level three, right, this kind of your operational or your control center, right, where you're going to have probably your latest and greatest, you know, say operating system, everything from VMware to your, you know, let's say on premise environment, cloud on different version of Windows or Linux, and then you can you need to secure this right with many of the solution for Trend Micro, and we can talk about that as well. And then last but not least, your cloud infrastructure, right, you leveraging public cloud, like Microsoft Cloud, or you know, the AWS, you definitely want to secure those public cloud as well. And we have solution, and we can talk about that. So on a very high level, and these are the products that we're gonna get to talk a little bit more, or maybe last but not least, you can, we're going to mention about, you know, you have a lot of contractors will come in, right, and you know, they want to build, perform maintenance and update on some of these PLC system. So we have a product called portable security, right, they allow you to basically perform a scanner on the system, make sure they are in compliance first, before you allow them to actually connect to your network. So that's a product called portable security. But we can talk about a little bit more as we go into the next question. Excellent.</p>
<p>13:03</p>
<p>One question I do have is, given this given the situation, given this solution, this diagram, how does somebody like me keep current with all of the requirements, all of the protection that is needed? on an ongoing basis? Does Trend Micro make that easy? Or seamless? Or how does that work?</p>
<p>13:31</p>
<p>Yeah, so the 10 on the vertical you're coming from right, because, you know, soon vertical, they are air gapped, they are completely isolated networks, and they don't allow any type of connectivity into the cloud. So for example, you got maybe the power and energy right there, you know, typically don't connect to the internet in that kind of scenario, right, then you will have to designate right in a system that can be connected to internet and you are allowed to basically you know connect with that system and that system then be allowed to download the latest update in patches from Trend Micro and from there, we can update all the software that deploy within an organization. So that's one way to do it. In the air in an environment where you are you know fully connected the internet right for example, if you you know, connect it into the cloud or into the internet, they in that case, almost every single product that we have available today. Basically, every time you load the system or the program or the software, it will automatically check to make sure that you have the latest and greatest you know updating patches available and if it is not, you know up to date he will download and automatically update that for you. Right so it's really dependent on the type of customer You are the environment you add. are you connected internet or basically all Isolated or air gap, right? So there's different options we can provide. Love it, love it. Now</p>
<p>15:05</p>
<p>let's start let's venture into your endpoint solutions. Can you sort of give us a little rundown of what those are?</p>
<p>15:14</p>
<p>Yeah, so from an endpoint perspective, right, you know, we have, I would say, kind of three solution that we are making available today to our customer, right? The first solution is what we call our Apex one, this is just your traditional, you know, endpoint security solution that provide, basically, you know, you know, Ai, intelligent, you know, auditor intelligent, you know, scanning a lot, you know, basically, signatures as well as some rule base that we provide. And also, you know, that's kind of your traditional, you know, the endpoint security solution. And you can protect all your latest and greatest Windows environment, right. And so, that is another product we have called Apex one for your, you know, I was convinced, you know, a Windows environment. Now, if you are on a critical environment, you know, especially like a Hmm, machine, or skater system that are running, let's say, Windows seven, or Windows XP, right, and many of these systems probably have been around for decades, where and you haven't even have a chance to patch or update, or, you know, because Microsoft haven't provided any, you know, available patch today, then we have a product called stellar protect. And this is a lockdown whitelisting security solution that basically allow you to deploy into the host itself, and was installed that we basically do a query of all the files and application in that system. And then we calculate a hash and make sure that these are the, you know, approved file that only allowed to run that machine. And then we'll lock that system down. And then only those files or the application that you approved it to run on that machine are allowed to run anything else beyond right on that list, it will not allow it to run. So for example, if you have a ransomware, right, they try to compromise the machine. But because the father was on the approved list, right, and therefore he won't allow it to run so you can prevent or protect that machine from being compromised by malware. Right. So that doesn't, you know, you know, the auto product would castella protect, right. And then last but not least, that's a product which is a USB, or we call it a portable security, right? And portable security. It's a very simple on demand scanning solution that can address many use cases, right? What are the use case we talked about was contractor who bring the laptop, they want to do perform some kind of update or maintenance on your PLCs or this year. So you want to make sure that those systems are up to date and not being compromised, or it's clean before you allow it to connect to the PLC or to your networks. So that's one use case, a portable Security Console will allow you to perform a scanning on the system first, before allowed to connect to that environment. What are the use case on portable security is that if you have an air gapping environment, right, you have zero connectivity to the internet, but you still want to make sure that those machines are, you know, clean and in compliance and make sure they don't have any dirty files in the system. You can take that USB stick, right and you gajic go to, you know machine on that air gap environment. And you can perform a scan of the system to make sure that it is clean and its compliance is not dirty, right? And then it will allow you to be compliant. Right. So that's another use case that border security can can address right so and so, these are three endpoint security solution that you know is really purpose built for, you know, many of these industrial, you know, site, you know, environment is you know, especially for some of this old systems.</p>
<p>19:37</p>
<p>So what I hear Richard, what we have is sort of that the apex one is a more of a traditional type of protection product, right traditional, and then what you have and I know I've been out there in the field and you know it because you're listening to me, you have legacy systems out there that are just all the better around for decades, and you need a product to be able to provide protection for those systems as well. And that is stellar. Right? Did I get that? Right? still protect? Yes, stellar, protect. And then finally, and this is something I see all the time. And the problem is, is that I see contractors coming and going, I love that use case, they come and go, come and go plug in, they get on the network, they do whatever is necessary. And, and this is the first time, Richard that I've heard of a product that you could sit there and go, Hey, well, we want you to get on the network. But we've got to make sure that your, your product, your your computer is in compliance. So let's just do this real quick. The value or the benefit of that, and what I hear is like, if it comes back, and I like the fact that it could be green, yellow, or red. But if it comes back and let's say it's read, then you could do something about it. It's like, okay, Hey, you got a problem? Let's clean it up before you can get on the network. Did I solve? Did I sum that up? Right?</p>
<p>21:06</p>
<p>Yeah, it especially the last row we see, you know, infection, you know, every infection over and over again, because, you know, people, you know, tend not to understand that use case. So they allow people just, you know, anyone just to connected, you know, that way just to update the, you know, your sees, and, you know, I see that all the time, right? Oh, yeah.</p>
<p>21:31</p>
<p>time I got him. If I had a nickel every time that happened, I'd be a rich man. Because it just it they that that's what happens. They come running in, plug, boom, get online, do whatever is necessary. And it happens all the time. All right. Anything else that we need to cover with this particular conversation? What we have is endpoint solutions with Trend Micro TX one networks. Great stuff. We talked about, sort of that overall diagram of how you protect your network, which will have out there on industrial talk. That's great stuff. And then we have three products that are specific to endpoint. That is Apex one, Stella, Stella. Right. And then yeah, and then, of course, you've got that the, the the portable solution of that. Sort of like it's just a thumb drive. So that's those are the three products. That's correct. All right. So yeah, I'm listening to you. I'm listening to you right now. And I want to know more about this, I want to be able to dig deep, I want to be able to have links, I want to see stuff I want to I want to experience, do you have a specific website that we could go to, as a listener to find out more?</p>
<p>22:59</p>
<p>Yes, so Scott saw all this part and print product I just talked about, it's available at trend micro.com, right, or LR, TX one. networks, right. And you can go there, right, you can actually download the software, rather stellar protect, as well as the apex one. And you can start to basically play with the product. Now, specifically to the proper security, because it's a you know, hardware. So it will require us to you know, ship a physical device into your, you know, office for you to, you know, you know, do a proof of concept or play with the product. So, if you're interested on any other product, the software you can follow, but the hardware version, you have to basically contact us in a one make sure that it can't be sent out to you know, you to test or verify or play with it. And look at the way the product work. Beautiful. Now, listeners, we're gonna be talking in the next episode and next podcast, we're gonna be talking about Network Solutions, because we're just scratching the surface now, one last question.</p>
<p>24:15</p>
<p>This is fantastic stuff. Richard. Fantastic. How does it it just, it'll stay up to date. Now we'll get out. You have solved that challenge too. Right?</p>
<p>24:29</p>
<p>Yes, yes. As I mentioned right depending on you know, the type of customer and the environment you have you know, if you're you know, unless you're truly connected environment and you have connectivity to internet then yes, you know, we always provide the latest update and patch and you know, rules a signature necessary to address the latest you know, you know, threat you know, from out there and once you connect, we will automatically download and update you know, software and upon itself. You If you want to non connected environment, right is all your gap that you have to basically, you know, connect to a designated machine that allow you connectivities into the internet. And then from there, you can not download the updated patch in there perform the update to your network by yourself. And that requires a little bit more effort on the on the IT side, but you know, I think that it's always there. And you know, you have to do it.</p>
<p>25:27</p>
<p>Love the solutions. Love the conversation listeners. Again, don't worry, don't fret, it'll be out at industrial talk.com it'll be you'll be able to find it in a jet second, get it there's no, there's no excuse for not being properly protected. Because Trend Micro has done a great job at making it making it work. Richard again, you you've hit it out of the park, thank you very much for joining industrial Talk. Thank you, Scott. Again, listeners, we're gonna wrap it up on the other side. Remember, we're going to be talking about Network Solutions in our next episode. So stay tuned. You're listening to the industrial talk, Podcast Network.</p>
<p>26:19</p>
<p>All right, once again, please make a note that this is number four in a podcast series that we're really tackling cybersecurity, getting all the answers out there as much as we possibly can. This one, again, endpoint products. TX one, networks. Trend Micro. They're out there. important, important stuff. Now you say to yourself, Scott saw great chirpin it's out on video, all that good stuff. Yeah, it is. But you know what else is great? You're gonna have these diagrams to download from these podcasts just go out to industrial talk.com. We're going to have this particular diagram, which is pretty cool. And then in our next episode, where we're talking about network products, we're going to also have a deck of about 10 slides there. So Oh, excuse no excuse. You got the information out there. All right. Be bold, be brave, daring greatly. hang out with people like Richard, like team Trend Micro like team TX one, and you're going to change the world. All right, we're going to have number five in the cybersecurity right around the corner. So stay tuned.</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/richard-ku-with-trend-micro-and-txone-networks-talk-about-cyber-security-endpoint-solutions/">Richard Ku with Trend Micro and txOne Networks talk about Cyber Security Endpoint Solutions</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://industrialtalk.com/episodes/richard-ku-with-trend-micro-and-txone-networks-talk-about-cyber-security-endpoint-solutions/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://podcasts.captivate.fm/media/99416724-5172-4b77-92ed-d324433ed2c0/richard-ku-end-point-products-interview.mp3" length="33823317" type="audio/mpeg" />

			</item>
		<item>
		<title>Richard Ku with Trend Micro and txOne Networks talk about Cyber Security Best Practices and Recommendations</title>
		<link>https://industrialtalk.com/episodes/richard-ku-with-trend-micro-and-txone-networks-talk-about-cyber-security-best-practices-and-recommendations/</link>
					<comments>https://industrialtalk.com/episodes/richard-ku-with-trend-micro-and-txone-networks-talk-about-cyber-security-best-practices-and-recommendations/#respond</comments>
		
		<dc:creator><![CDATA[Scott MacKenzie]]></dc:creator>
		<pubDate>Tue, 15 Jun 2021 15:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://industrialtalk.com/?post_type=captivate_podcast&#038;p=7698</guid>

					<description><![CDATA[<p>In this week's Industrial Talk Podcast we're talking to Richard Ku with TXOne Network and Trend Micro about "Cyber Security Best Practices and Recommendations for your Digital Transformation Journey".  Get the answers to your "Industrial Cyber Security" questions along with Richard's unique insight on the “How” on this Industrial Talk interview!</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/richard-ku-with-trend-micro-and-txone-networks-talk-about-cyber-security-best-practices-and-recommendations/">Richard Ku with Trend Micro and txOne Networks talk about Cyber Security Best Practices and Recommendations</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="cfm-player-iframe" style="width: 100%; height: 170px; margin-bottom: 20px; border-radius: 10px; overflow:hidden; border: 1px solid #d6d6d6;"><iframe style="width: 100%; height: 170px;" frameborder="no" scrolling="no" seamless allow="autoplay" src="https://player.captivate.fm/8f63131e-9f1e-459a-bbf7-fd57541b1e0e"></iframe></div><p>In this week's <strong><em>Industrial Talk Podcast</em></strong> we're talking to <strong>Richard Ku </strong>with TXOne Network and Trend Micro about <b>&#8220;Cyber Security Best Practices and Recommendations for your Digital Transformation Journey&#8221;</b>.  Get the answers to your &#8220;Industrial Cyber Security&#8221; questions along with Richard's unique insight on the “How” on this Industrial Talk interview!</p>
<p><strong>Trend Micro Event:  Cyber Security Perspectives.  Hold Your Seat <a href="https://perspectives.trendmicro.com/?_ga=2.70356185.832642918.1623267552-1558506737.1620854188" target="_blank" rel="noopener">Here</a>.</strong></p>
<p><iframe loading="lazy" title="Trend Micro Perspectives - June 2021 - Digital Transformation Insights for Security Leaders" width="500" height="281" src="https://www.youtube.com/embed/jjVYi2OIBG8?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<p>Finally, get your exclusive free access to the <a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener noreferrer">Industrial Academy</a> and a series on “<a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener noreferrer"><strong>Why You Need To Podcast</strong></a>” for Greater Success in 2020. All links designed for keeping you current in this rapidly changing Industrial Market. Learn! Grow! Enjoy!</p>
<h2>RICHARD KU'S CONTACT INFORMATION:</h2>
<p><strong>Personal LinkedIn: </strong><a href="https://www.linkedin.com/in/richardku1/" target="_blank" rel="noopener">https://www.linkedin.com/in/richardku1/</a></p>
<p><strong>Company LinkedIn: </strong><a href="https://www.linkedin.com/company/trend-micro/" target="_blank" rel="noopener">https://www.linkedin.com/company/trend-micro/</a></p>
<p><strong>TX One Networks Company Website:</strong> <a href="https://www.txone-networks.com/en-global" target="_blank" rel="noopener">https://www.txone-networks.com/en-global</a></p>
<p><strong>Trend Micro Company Website: </strong><a href="https://www.trendmicro.com/en_us/business.html" target="_blank" rel="noopener">https://www.trendmicro.com/en_us/business.html</a></p>
<h2>PODCAST VIDEO:</h2>
<p><iframe loading="lazy" title="Richard Ku w/ Trend Micro and TXOne talk about Cyber Security Best Practices and Recommendations" width="500" height="281" src="https://www.youtube.com/embed/MIElCbBZXhQ?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<h2>Other Powerful Cyber Security Resources:</h2>
<p><a href="https://www.trendmicro.com/vinfo/us/security/threat-intelligence-center/internet-of-things/" target="_blank" rel="noopener">https://www.trendmicro.com/vinfo/us/security/threat-intelligence-center/internet-of-things/</a></p>
<p><a href="https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/fake-company-real-threats-logs-from-a-smart-factory-honeypot" target="_blank" rel="noopener">Fake Company, Real Threats: Logs From a Smart Factory Honeypot &#8211; Security News (trendmicro.com)</a></p>
<p><a href="https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/lost-in-translation-when-industrial-protocol-translation-goes-wrong" target="_blank" rel="noopener">Lost in Translation: When Industrial Protocol Translation goes Wrong &#8211; Security News (trendmicro.com)</a></p>
<p><a href="https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/unveiling-the-hidden-risks-of-industrial-automation-programming" target="_blank" rel="noopener">Unveiling the Hidden Risks of Industrial Automation Programming &#8211; Security News (trendmicro.com)</a></p>
<p><a href="https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/security-in-the-era-of-industry-4-dealing-with-threats-to-smart-manufacturing-environments" target="_blank" rel="noopener">Security in the Era of Industry 4.0: Dealing With Threats to Smart Manufacturing Environments &#8211; Security News (trendmicro.com)</a></p>
<p><a href="https://resources.trendmicro.com/Smart-Factory-Success-Story.html" target="_blank" rel="noopener">https://resources.trendmicro.com/Smart-Factory-Success-Story.html</a></p>
<p><a href="https://www.youtube.com/watch?v=mKJomr8HqdQ" target="_blank" rel="noopener">https://www.youtube.com/watch?v=mKJomr8HqdQ</a></p>
<h2>THE STRATEGIC REASON &#8220;WHY YOU NEED TO PODCAST&#8221;:</h2>
<p><a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-content/uploads/2020/02/Why-you-need-to-Podcast-Graphic-2.png" width="1024" height="538" /></a></p>
<h2>OTHER GREAT INDUSTRIAL RESOURCES:</h2>
<p><strong>NEOM</strong>:  <a href="https://www.neom.com/en-us" target="_blank" rel="noopener noreferrer">https://www.neom.com/en-us</a></p>
<p><strong>CAP Logistics:</strong>  <a href="https://www.caplogistics.com/" target="_blank" rel="noopener noreferrer">https://www.caplogistics.com/</a></p>
<p><strong>Hitachi Vantara:</strong> <a href="https://www.hitachivantara.com/en-us/home.html" target="_blank" rel="noopener noreferrer">https://www.hitachivantara.com/en-us/home.html</a></p>
<p><strong>Industrial Marketing Solutions:</strong>  <a href="https://industrialtalk.com/industrial-marketing/" target="_blank" rel="noopener noreferrer">https://industrialtalk.com/industrial-marketing/</a></p>
<p><strong>Industrial Academy:</strong> <a href="https://industrialtalk.com/industrial-academy/" target="_blank" rel="noopener noreferrer">https://industrialtalk.com/industrial-academy/</a></p>
<p><strong>Industrial Dojo:</strong> <a href="https://industrialtalk.com/industrial_dojo/" target="_blank" rel="noopener noreferrer">https://industrialtalk.com/industrial_dojo/</a></p>
<p><strong>Safety With Purpose Podcast:</strong> <a href="https://safetywithpurpose.com/" target="_blank" rel="noopener noreferrer">https://safetywithpurpose.com/</a></p>
<h2>YOUR INDUSTRIAL DIGITAL TOOLBOX:</h2>
<p><strong>LifterLMS:</strong> Get One Month Free for $1 – <a href="https://lifterlms.com/" target="_blank" rel="noopener noreferrer">https://lifterlms.com/</a></p>
<p><strong>Active Campaign:</strong> <a href="https://www.activecampaign.com/?_r=H855VEPU" target="_blank" rel="noopener noreferrer">Active Campaign Link</a></p>
<p><strong>Social Jukebox:</strong> <a href="https://www.socialjukebox.com/" target="_blank" rel="noopener noreferrer">https://www.socialjukebox.com/</a></p>
<h2>Industrial Academy (One Month Free Access And One Free License For Future Industrial Leader):</h2>
<p><a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-admin/wp-content/uploads/2019/10/Industrial-Academy-Graphic.png" width="1024" height="538" /></a></p>
<h2>Business Beatitude the Book</h2>
<p><img loading="lazy" decoding="async" class="alignleft" src="https://industrialtalk.com/wp-content/uploads/2019/10/BB-Book-Cover.png" width="138" height="215" /></p>
<p class="ql-align-center">Do you desire a more joy-filled, deeply-enduring sense of accomplishment and success? Live your business the way you want to live with the BUSINESS BEATITUDES&#8230;The Bridge connecting sacrifice to success. <strong>YOU NEED THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><strong>TAP INTO YOUR INDUSTRIAL SOUL, RESERVE YOUR COPY NOW! BE BOLD. BE BRAVE. DARE GREATLY AND CHANGE THE WORLD. GET THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><a href="https://industrialtalk.com/business-beatitude-reserve/" target="_blank" rel="noopener noreferrer"> Reserve My Copy and My 25% Discount</a></p>
<h2>PODCAST TRANSCRIPT:</h2>
<p><strong>SUMMARY KEYWORDS</strong></p>
<p>organization, cybersecurity, industrial, richard, standards, people, tx, digital transformation, cyber, trend micro, Iot, technology, security, industry, digital transformation journey, podcast, implemented, key pillars, apply, strategy</p>
<p>00:04</p>
<p>Welcome to the industrial talk podcast with Scott MacKenzie. Scott is a passionate industry professional dedicated to transferring cutting edge industry focused innovations and trends while highlighting the men and women who keep the world moving. So put on your hard hat, grab your work boots, and let's get again, welcome to industrial talk your place to talk industrial. How about that? I just sort of flipped that all thing around. That is right. We celebrate you industrial professionals, industrial heroes, you are bold, you are brave. You dare greatly. Man, innovate, you're solving problems. You're changing lives and you're changing the world each and every day. Yet we have to, we have to celebrate you on this podcast. It's absolutely incredible. Thank you very much for joining. As always. All right. Again, this is in a five part series on cybersecurity. And if you're into digital transformation, which you should be, if you've been listening to the industrial talk podcast, you'll know that we feature a lot of companies, a lot of professionals who are experts at that you know what they need? Yep, cybersecurity, we're gonna be talking a little bit about cybersecurity best practices and recommendations on your digital transformation journey with the guy Richard cool. Let's get cracking. Yeah, you need it. Get it just need it, do not ignore it. Get up front on this saying you need to go through digital transformation. Yes, you need to create that level of resiliency within your, your processes, your manufacturing your industry. Absolutely. That is a digital transformation conversation, plenty of incredible professionals out there. And a part of that whole conversation, of course, is cyber security and doing it right and being able to know that your assets, your business, are thoroughly protected from the various nefarious individuals out there. Before we get into this particular, cybersecurity best practices and recommendations. Again, let's sort of point something out today is the 15th. So the the event, the perspectives event that is taking place at Trend Micro is going on right now. But for Americas, it's tomorrow. So put that on your calendar, go out to industrial talk COMM And you will find a link to this particular event. And it is if you're in the Americas, it is at 11am to 4pm. That is June 16th. If you're in Europe, it's 10am 3pm. And it is it's it's vitally important. Don't, don't just brush it off. Here it is free information. Because we've got to always be about learning, we always got to be about collaborating, we've got to be about innovation. And we can't stop. You can't innovate without collaborating, you can't collaborate without educate, and you can't do all of these three things independently, because we've got to keep learning, we got to keep collaborating, we got to keep innovating, so that the future and your business is resilient, and you can prosper. Alright, Richard Kuh. We're going to be once again, talking about cyber security best practices, and recommendation on number three. Now, if you didn't get number two and number one, it's a must all out on industrial talk. Enjoy the conversation. Richard, welcome back to the industrial talk podcast. Now listeners. This is going to be number three, called cybersecurity best practices and recommendations, this particular podcast number three, but I highly recommend the other two. The first one that we did was cybersecurity threats, challenges and risks. This is important information that you need to hear. And number two, podcast number two is industrial business and technology challenges. Same thing, and it is all directed to that digital transformation journey that many within industry are on. And if you don't have that cyber sort of mindset cybersecurity mindset as you begin this journey, there are challenges and Richard and TX one are here to help and they're willing to provide all this particular information. Richard, how are you?</p>
<p>04:39</p>
<p>Scott, and thanks for the invitation again.</p>
<p>04:45</p>
<p>Love it now. Richard, uh, just for clarification for the listeners out there. I see a couple of things I see Trend Micro, and then I see this another organization called TX one. Give us a little Background into that, that, that structure?</p>
<p>05:06</p>
<p>Yeah, so I think most of you out there probably know Trend Micro pretty well, right, we been around for a little bit of, what, 30 years, right in the industry. And we are one of the market leading in cybersecurity, you know, our, you know, for for many, many years. And so that's Trend Micro, but a few years ago, we recognized that there had been a lot of challenge in terms of, you know, getting the right solution and right technology to you know, apply to the industrial control side, specifically on the OT, environmental operational technology environment. So we basically did a joint venture with another company called moxa. And this joint venture is called TX one networks and TX one there was really is a sister company, and product Trend Micro and you know, what it does is really, you know, focus in, basically, like I said, design and building the right solution for the industry control environment. And that's what gx one next.</p>
<p>06:14</p>
<p>I'll tell you, right now, that that focus is so important, because in many of the conversations I've had over the past year to whatever digital transformation is at the forefront, and people want to be able to transition their business to a more digitally centric type of business now that requires, you know, technology and innovation, but it also requires a focus in on cybersecurity and your strategy. Can you give the listeners, the big picture? Give us the big picture?</p>
<p>06:55</p>
<p>Yeah, so I think, you know, with this digital transformation, right, you know, we believe that cyber security had to play a very key and critical role in that particular trans transition or transformation. And so, you know, when we look at cyber strategy, you know, I typically tell people, there are really four key pillars right in and, you know, and having an effective, you know, OT ICS security, begin with understanding the big picture. Right. And, and those four components are people, process, technology, and culture. Right, and we can talk about that a little bit more detail. But, you know, first, let's talk about the people, right, people play a very important role in a cyber strategy, right training and security aware organization can also reduce, you know, significant your security risk for the organization. And I think that's one thing. The other one is, you know, having well trained professional, right, qualified and competent people and really know, how can help organizations address cyber threat, and also in cyber challenge. So, as far as you know, you know, having this competence people in how organizations deploy and understand the right technology, you know, on to the, you know, operational technology environment, right. So, that's the people components. Right. And, you know, that second component, which the process, you know, I think any cyber is in a security strategy, right, you know, and to be effective, the organization must develop, implement some type of process or procedure, right, ensuring they are clear roles and responsibility, and management system are put in place, right, within the organization. I think we talked about this issue a little bit on the previous basis, basically, podcast, and, you know, one of the things we're seeing is the organization going through this digital transformation, right, and you have this convergence between it and OT, it is very difficult, right, to have, you know, clear roles and responsibility, you know, between the ITT because traditionally, I think it used to be the one responsible for the cybersecurity and now you have this convergence happening from the OT side. And now that I'm clear roles and responsibilities, so, these procedures and process have to be implemented, you know, even more you want digital transformation as a tourist, you know, OT in a cyber strategy, right. So putting good governance in place right now policy and frameworks are good, you know, thing to have in there. Some best practice, maybe some it ot auditing, you know, process in place, right.</p>
<p>09:50</p>
<p>So, this is what's interesting and I think you bring up a good point in the past legacy type thinking the OT in it. Organizations then and they didn't, they didn't work together, going forward in this new world and whatever this this digital transformation world, it's vitally important that those both organizations work together with a common, you know, like you said process procedure and governance to be successful in a cybersecurity type of mindset.</p>
<p>10:27</p>
<p>Correct? Yes. And then, you know, I think that the third thing we talk about as one of the pillars is technology itself, right? I think one of the big challenge and I think difficult for most people is that not every technology right, you know, from the IP side can be implemented, you know, on the OT or icsr and having a good understanding of the technology and be able to task verify and validate and make sure you can work and adapt into darkened environment is very important, right. So, I think that the knowledge component is also good. The other one, you know, we talk about people, right, having the competency skill people, and who understand the technology, and can take those technology really kind of deploy right into the environment or to the, you know, infrastructure is also is very good. So, the people and the technology also can play kind of, you know, side by side, important role. And last, but not least, is the culture. I think creating a cyber culture within your organization is crucial, right? To reduce the cyber risk. And that really means starting from the, you know, CEO, or the top, all the way to the lowest level, you know, your organization and make sure that everybody understand what is does, you know, this cyber strategy, you know, yes, and what are some the threat to the organization, right. And so, as long as you have that good fitting culture within an organized organization, it can reduce a lot of, you know, cyber challenge, you know, for the company.</p>
<p>12:06</p>
<p>All right. So, listeners, what we have, from a big picture perspective, the four key pillars, as communicated by Richard people, which is a well trained cyber workforce, which is also sort of have that heightened security awareness to well developed process and procedures, sort of that governance, that ability for the OT, and it to truly understand roles and responsibilities, the technology, which is driven by the people and having the right technology in the in the OT and IoT environment. And then of course, definitely a cybersecurity culture is vital for any company that is going down the road of digital transformation and having that awareness going forward from the CEO, all the way down to the frontline, individuals. Did I wrap that up? Pretty good there, Richard? Yeah, that's a very good summary, Scott. Okay. Now we got it, we've got to address it. There are standards out there, there are standards so that you don't have to sit there and say, Okay, I like what Richard is saying, I like what he's talking about. But I don't really have to start, you know, right from the beginning. Let's talk a little bit about standards. Help us understand those.</p>
<p>13:35</p>
<p>Yeah, so I think, you know, I think many organization, you know, when come to, you know, create a cyber strategy, right? They have to do a lot of research, you know, and try to understand, you know, how to do the right security control with the telling people, hey, there are a lot of the industry standard, and best practice out there for industrial control, or for operational and technology environment. Right. And, you know, and they are being used by many organization, you know, for, you know, I don't know, several decades, it's been very effective. And so, organization doesn't have to reinvent the wheel, right. I mean, some of the standards we talk about are like the iisa, IEC 624 fours, you know, three standard, right, this is a framework, and it's good for general industrial automation and power automation. I think that's a very good standard. You have, you know, standards such as the NIST sp 800 das 53. And this is also good data for ICS in IT security reference, you know, standards, and then you know, the other one or like, things such as ISO IEC 27,000 is a good guy for ITC. At a reference, and you know, and also depend on, you know, what vertical you play, you know, for example, you have the if your, your energy, you have the note sip standard. So there are many standards out there, their organization can start by, you know, just looking at this and use this as a baseline to how you plan your, you know, cybersecurity strategy, and not necessarily have to reinvent the wheel or re do a lot of work. Because all this has been around for many, I would say, years and people in organization have been using it.</p>
<p>15:36</p>
<p>So, when I look at these standards, the general industrial automation, the iisa IEC 62 443, who is I ask a?</p>
<p>15:51</p>
<p>Well, I say it's, it's the ethical about automation, right. And this is, include a lot of, I was a independent volunteer researcher, right, that need to come together, and they help to define right strategy across different vertical across different technology, and how to apply different security control, you know, or, you know, into the different type of environment, you know, for example, I sit in the, you know, working group, a, right, this is a committee that we've focused on how to better communicate somebody standing into a different type of customer. Right. And also, there's a, working group number nine, I'm sitting in also, in there, we talk about how to best provide, you know, guidance for organization to apply somebody's security control into the industrial control environment that be as a manufacturing or power, or, you know, oil and gas, right. And so, the International Society of automation have been around for many decades, and they have, it's a very well represented, you know, organization with many, many professionals out there.</p>
<p>17:12</p>
<p>Now, as I look at these standards out here, Richard, is there a cost if I'm a company, and I hear what you're saying, and I have a desire to proceed forward, is there a cost to get this information?</p>
<p>17:29</p>
<p>I think some of these standards are readily available out there. I think some of these organizations, for example, I say, right, they have our freelance, you know, expert, now who can help organization to look at the standard, right, and they can translate the standard and how to best apply. And yes, also, if you just want to get the information, there is no cost. But if you want to go a little bit more deeper, right to really try to implement some of the standard, the end how to better you know, apply some discount security control, then your day some cost and associate with it, but again, it depend on integrations</p>
<p>18:12</p>
<p>does TX one sort of fit into that outside of all of the other stuff that TX one does the TLS one network does? Do you fit into that sort of help companies define that right? cyber strategy?</p>
<p>18:30</p>
<p>Yeah, so, you know, here on your organization, right, we developed many industrial control products designed for different verticals, especially, you know, manufacturers, you know, vertical oil and gas and power. And so, we do have, you know, security solution with you know, design and you know, toe and also applied to somebody standard, you know, for example, you know, it is understand that will require your say some type of security control, to be put, you know, say applied to it like to escape a system, like, for example, an HDMI machine, right? And how do you apply that kind of solution? So, we have security solution that actually can be applied into the host directly on Hmm, machine, or we have security solution that can actually be implemented before, before the box that Oh, before the, the system, so, this out solution can apply to some understand that as well. I will talk about that a little bit more probably on the next. You know, I think podcast, but you know, we'll talk about that as well.</p>
<p>19:44</p>
<p>All right, listeners, what we have is we've got four pillars, make a note of it. People, process procedures, technology, and culture. Look at that. We've already talked about it and then from From an overall strategy perspective, there are standards to help move you forward to have that sort of that security awareness, that security culture, which is very important if you're a company that is proceeding forward within this industrial digital transformation journey. Excellent job. Excellent job, Richard. Thank you, Scott. Now, we're going to have all the contact information for Richard, all the information that you need to know about TX one out on industrial talk comm so we're not we're going to wrap it up on the other side. So stay tuned. You're listening to the industrial talk Podcast Network. Alright, as you can see with Richard, and trend, micro and TX one, we are building incredible knowledge when it comes to cybersecurity and your digital transformation. So remember, go out, listen to podcast number one, two, and three, we've got two more. Number four is going to be cybersecurity solutions. And number five, hopefully, we could get the CEO of Trend Micro on this particular podcast so that we could talk about what's taking place in the marketplace. All right, be bold, be brave, dare greatly hang out with people who are bold, brave and daring greatly, and you will change the world and you will change lives. That is a fact jack because you are in industry. You are that incredible. Now, one last time, tomorrow, sign up. It's important. This is a cybersecurity event called perspectives. It is tomorrow, June 16. Go out there. Industrial talk.com has the link. All right. Thank you very much for joining. We're gonna have another great cybersecurity conversation shortly.</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/richard-ku-with-trend-micro-and-txone-networks-talk-about-cyber-security-best-practices-and-recommendations/">Richard Ku with Trend Micro and txOne Networks talk about Cyber Security Best Practices and Recommendations</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://industrialtalk.com/episodes/richard-ku-with-trend-micro-and-txone-networks-talk-about-cyber-security-best-practices-and-recommendations/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://podcasts.captivate.fm/media/3108ac9c-77a8-4675-80e8-3f82d9a552e2/tm-podcast-3-w-richard-ku.mp3" length="27008965" type="audio/mpeg" />

			</item>
		<item>
		<title>Richard Ku with Trend Micro and txOne Networks talk about Cyber Security Challenges with Digital Transformation</title>
		<link>https://industrialtalk.com/episodes/richard-ku-with-trend-micro-and-txone-networks-talk-about-cyber-security-challenges-with-digital-transformation/</link>
					<comments>https://industrialtalk.com/episodes/richard-ku-with-trend-micro-and-txone-networks-talk-about-cyber-security-challenges-with-digital-transformation/#respond</comments>
		
		<dc:creator><![CDATA[Scott MacKenzie]]></dc:creator>
		<pubDate>Mon, 14 Jun 2021 15:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://industrialtalk.com/captivate-podcast/richard-ku-with-trend-micro-and-txone-networks-talk-about-cyber-security-challenges-with-digital-transformation/</guid>

					<description><![CDATA[<p>In this week's Industrial Talk Podcast we're talking to Richard Ku with txOne Network and Trend Micro about "Cyber Security: Digital Transformation Challenges Facing Industrial Organizations".  Get the answers to your "Industrial Cyber Security" questions along with Richard's unique insight on the “How” on this Industrial Talk interview!</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/richard-ku-with-trend-micro-and-txone-networks-talk-about-cyber-security-challenges-with-digital-transformation/">Richard Ku with Trend Micro and txOne Networks talk about Cyber Security Challenges with Digital Transformation</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="cfm-player-iframe" style="width: 100%; height: 170px; margin-bottom: 20px; border-radius: 10px; overflow:hidden; border: 1px solid #d6d6d6;"><iframe style="width: 100%; height: 170px;" frameborder="no" scrolling="no" seamless allow="autoplay" src="https://player.captivate.fm/b2c607ff-878a-4772-b806-ee0d8b60e5c7"></iframe></div><p>In this week's <strong><em>Industrial Talk Podcast</em></strong> we're talking to <strong>Richard Ku </strong>with txOne Network and Trend Micro about <b>&#8220;Cyber Security: Digital Transformation Challenges Facing Industrial Organizations&#8221;</b>.  Get the answers to your &#8220;Industrial Cyber Security&#8221; questions along with Richard's unique insight on the “How” on this Industrial Talk interview!</p>
<p><strong>Trend Micro Event:  Cyber Security Perspectives.  Hold Your Seat <a href="https://perspectives.trendmicro.com/?_ga=2.70356185.832642918.1623267552-1558506737.1620854188" target="_blank" rel="noopener">Here</a>.</strong></p>
<p><iframe loading="lazy" title="Trend Micro Perspectives - June 2021 - Digital Transformation Insights for Security Leaders" width="500" height="281" src="https://www.youtube.com/embed/jjVYi2OIBG8?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<p>Finally, get your exclusive free access to the <a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener noreferrer">Industrial Academy</a> and a series on “<a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener noreferrer"><strong>Why You Need To Podcast</strong></a>” for Greater Success in 2020. All links designed for keeping you current in this rapidly changing Industrial Market. Learn! Grow! Enjoy!</p>
<h2>RICHARD KU'S CONTACT INFORMATION:</h2>
<p><strong>Personal LinkedIn: </strong><a href="https://www.linkedin.com/in/richardku1/" target="_blank" rel="noopener">https://www.linkedin.com/in/richardku1/</a></p>
<p><strong>Company LinkedIn: </strong><a href="https://www.linkedin.com/company/trend-micro/" target="_blank" rel="noopener">https://www.linkedin.com/company/trend-micro/</a></p>
<p><strong>TX One Networks Company Website:</strong> <a href="https://www.txone-networks.com/en-global" target="_blank" rel="noopener">https://www.txone-networks.com/en-global</a></p>
<p><strong>Trend Micro Company Website: </strong><a href="https://www.trendmicro.com/en_us/business.html" target="_blank" rel="noopener">https://www.trendmicro.com/en_us/business.html</a></p>
<h2>PODCAST VIDEO:</h2>
<p><iframe loading="lazy" title="Richard Ku w/ Trend Micro/txOne Networks talks Cyber Security Challenges with Digital Transformation" width="500" height="281" src="https://www.youtube.com/embed/kGv6tgn1S7E?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<h2>Other Powerful Cyber Security Resources:</h2>
<blockquote class="wp-embedded-content" data-secret="XOdvRM2CkY"><p><a href="https://iiot-world.com/ics-security/cybersecurity/whitepaper-integrating-security-into-the-iot-strategy-in-the-new-converged-environment/">[Whitepaper] Integrating Security Into the IoT Strategy in the New Converged Environment</a></p></blockquote>
<p><iframe class="wp-embedded-content" sandbox="allow-scripts" security="restricted" title="&#8220;[Whitepaper] Integrating Security Into the IoT Strategy in the New Converged Environment&#8221; &#8212; IIoT-World.com" src="https://iiot-world.com/ics-security/cybersecurity/whitepaper-integrating-security-into-the-iot-strategy-in-the-new-converged-environment/embed/#?secret=XOdvRM2CkY" data-secret="XOdvRM2CkY" width="500" height="282" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe></p>
<p><a href="https://us-cert.cisa.gov/ics" target="_blank" rel="noopener">https://us-cert.cisa.gov/ics</a></p>
<p><a href="https://www.waterisac.org/" target="_blank" rel="noopener">https://www.waterisac.org/</a></p>
<p><a href="https://www.trendmicro.com/us/iot-security/" target="_blank" rel="noopener">https://www.trendmicro.com/us/iot-security/</a></p>
<h2>THE STRATEGIC REASON &#8220;WHY YOU NEED TO PODCAST&#8221;:</h2>
<p><a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-content/uploads/2020/02/Why-you-need-to-Podcast-Graphic-2.png" width="1024" height="538" /></a></p>
<h2>OTHER GREAT INDUSTRIAL RESOURCES:</h2>
<p><strong>NEOM</strong>:  <a href="https://www.neom.com/en-us" target="_blank" rel="noopener noreferrer">https://www.neom.com/en-us</a></p>
<p><strong>CAP Logistics:</strong>  <a href="https://www.caplogistics.com/" target="_blank" rel="noopener noreferrer">https://www.caplogistics.com/</a></p>
<p><strong>Hitachi Vantara:</strong> <a href="https://www.hitachivantara.com/en-us/home.html" target="_blank" rel="noopener noreferrer">https://www.hitachivantara.com/en-us/home.html</a></p>
<p><strong>Industrial Marketing Solutions:</strong>  <a href="https://industrialtalk.com/industrial-marketing/" target="_blank" rel="noopener noreferrer">https://industrialtalk.com/industrial-marketing/</a></p>
<p><strong>Industrial Academy:</strong> <a href="https://industrialtalk.com/industrial-academy/" target="_blank" rel="noopener noreferrer">https://industrialtalk.com/industrial-academy/</a></p>
<p><strong>Industrial Dojo:</strong> <a href="https://industrialtalk.com/industrial_dojo/" target="_blank" rel="noopener noreferrer">https://industrialtalk.com/industrial_dojo/</a></p>
<p><strong>Safety With Purpose Podcast:</strong> <a href="https://safetywithpurpose.com/" target="_blank" rel="noopener noreferrer">https://safetywithpurpose.com/</a></p>
<h2>YOUR INDUSTRIAL DIGITAL TOOLBOX:</h2>
<p><strong>LifterLMS:</strong> Get One Month Free for $1 – <a href="https://lifterlms.com/" target="_blank" rel="noopener noreferrer">https://lifterlms.com/</a></p>
<p><strong>Active Campaign:</strong> <a href="https://www.activecampaign.com/?_r=H855VEPU" target="_blank" rel="noopener noreferrer">Active Campaign Link</a></p>
<p><strong>Social Jukebox:</strong> <a href="https://www.socialjukebox.com/" target="_blank" rel="noopener noreferrer">https://www.socialjukebox.com/</a></p>
<h2>Industrial Academy (One Month Free Access And One Free License For Future Industrial Leader):</h2>
<p><a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-admin/wp-content/uploads/2019/10/Industrial-Academy-Graphic.png" width="1024" height="538" /></a></p>
<h2>Business Beatitude the Book</h2>
<p><img loading="lazy" decoding="async" class="alignleft" src="https://industrialtalk.com/wp-content/uploads/2019/10/BB-Book-Cover.png" width="138" height="215" /></p>
<p class="ql-align-center">Do you desire a more joy-filled, deeply-enduring sense of accomplishment and success? Live your business the way you want to live with the BUSINESS BEATITUDES&#8230;The Bridge connecting sacrifice to success. <strong>YOU NEED THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><strong>TAP INTO YOUR INDUSTRIAL SOUL, RESERVE YOUR COPY NOW! BE BOLD. BE BRAVE. DARE GREATLY AND CHANGE THE WORLD. GET THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><a href="https://industrialtalk.com/business-beatitude-reserve/" target="_blank" rel="noopener noreferrer"> Reserve My Copy and My 25% Discount</a></p>
<h2>PODCAST TRANSCRIPT:</h2>
<p><strong>SUMMARY KEYWORDS</strong></p>
<p>cybersecurity, organization, industrial, business, digital transformation, guidelines, digital transformation journey, important, understand, big, trend micro, podcast, industry, conversation, ot, running, number, challenge, requiring, system</p>
<p>00:04</p>
<p>Welcome to the industrial talk podcast with Scott MacKenzie. Scott is a passionate industry professional dedicated to transferring cutting edge industry focused innovations and trends while highlighting the men and women who keep the world moving. So put on your hard hat, grab your work boots, and let's get All right. Welcome to the industrial talk podcast, your single location of all things industrial, because we celebrate you the industrial hero, you are bold, you are brave, you dare greatly. You solve problems. You're changing lives, you're changing the world. You're the dream makers. You're the miracle workers. That's why we celebrate you on this podcast. This is podcast number two, in our series on cyber security when you're in digital transformation, when you're saying hey, and I've talked to a lot of people near saying, Hey, we want to go down this digital transformation journey. Yeah, cybersecurity, let's get cracking. Yeah, you can't you can't just sit there can't just sit there and say, Oh, yeah, we want to go down digital transformation, which you should, which is important. It is necessary to create a business of resiliency, long term success, competitive advantage, you name it. It's important. And there are incredible individuals out there credible companies that are that you need to contact. And of course, they've been on the industrial talk podcast, because we're all about the need to educate, collaborate and innovate. So that's what we're all about. Now. This is podcast number two. This is with Richard Kuh. He is with Trend Micro. And I like their tagline. Here's the tagline securing your industrial digital transformation journey. Yeah. And on this particular conversation, we're going to be talking about industry business, technical challenges with organizations on their digital transformation, journey. Yeah, that's what we're doing. However, however, grab your paper and pencil because what you've got because this is cybersecurity, we're celebrating cybersecurity. Here, we're celebrating the people, like team Trend Micro boom or TX one, right. That's another nother company, same parent. But anyway, we're celebrating cybersecurity this month, just because we talk about digital transformation. We keep on sort of overlooking that cybersecurity side. So with that said, there's an event and it is June. Well, it starts June 15. If you're in the Asia Pacific area, or the Middle East, Africa, Mediterranean, it starts at that time. Or if you're in the Americas or Europe, June 16. It is live, right? But they're gonna be pumping it out. And I will have all of the information the times and how to save your seat. Yeah, it's global baby. And it is necessary. And it's important. And you're going to be hearing from Eva Chen. And she is the co founder and CEO of micro trends. So they've been around a long time, she's seen a lot. And I highly recommend that you do that if you're on this digital transformation journey. Alright, let's get on with the podcast. Once again, this is number two, if you haven't listened to number one, cybersecurity threats, challenges and risks. Go out there. It's out there. It's published right now. This one's going to be industrial business and technical challenges facing organizations as they go through digital transformation, important conversation. Richard nails it? Of course he does. And here it is. All right, Richard, welcome back to the second installment of the Trend Micro cybersecurity, caught, you know, conversation and we're going to be talking on this particular podcast, industry, business and technical challenges facing industrial organizations as they go through their digital transformation. slapping journey. Richard, how are you? Good. Good to be back. Scott, and I good to hear from you again. I am telling you that I'm hypersensitive to cybersecurity. I'm hypersensitive to what is taking place, specifically with industry and their desire to go down the digital transformation road. But a big component of that is of course, their cybersecurity and being focused on that. What are those challenges that we are talking about in this industry? And the technical challenges in industry?</p>
<p>04:54</p>
<p>Yeah, so I think like every other industry, right, I think over the last I was, you know, many decades as organization going through that transformation. But, you know, regardless of you know, if you look at back in the 90s, were, you know, that you had that transformation from, you know, desktop to server and client server architecture to wide area network, the internet now, virtualization cloud Ryan, every time you see this transformation by every other's decades, you do have a, I will say, level of concerns when it comes to cyber security, because as you transform the organization, you will open up more vectors and more threat vectors for the organization, and is very similar to this digital transformation, you know, also in industry, or in industrial space as well, you know, when you go from an industrial 1.0, right now to 4.0, you see that big changes, and you start to see more, I think drive vectors, you know, coming around. And so, definitely, there is a lot of business and technical challenge facing many, you know, organization. One specifically, I think one of the biggest one is, you know, we talked about the lack of domain knowledge, or expertise out there in providing sufficient cybersecurity knowledge and, you know, adding countermeasure for organization, and that's a big one, I think, today, we are facing a big challenge in that for many organizations, right, because, you know, lack of expertise are the second big one, I think, as organization going through this conversion between it ot right, you know, you have a very unclear roles and responsibility between the IT organization in the old tea, and that have not yet been fully defined. And you're not clearly defined by many organizations. So that is a big challenge, I think, for many organizations as they go into transformation, right? Because traditionally, all the cybersecurity are typically managed by the you know, it, folks, and now you're adding this additional component that creates, you know, that big challenges. We also talk about, kind of the third thing is all this legacy liability, right, you know, you got some of these environments on this platform. And some of these networks have been around for decades. And, you know, many of these systems are all right, you know, especially if you have a SCADA system or ATM machine running Windows seven, or Windows XP, and those environment is Oh, it doesn't get updates or patches. Right. So that's a big challenge. And so that legacy issues become very, very important thing. The fourth thing I think, is a big, you know, I think business challenge is you have this, I will say organizations tend to pursue, right, the economic, overall, this cybersecurity, right, me, meaning that they tend to, you know, focus maybe maybe on a business or color, you know, cybersecurity is kind of the secondary, you know, I think, and so, this is a big challenge. And I think we can move at the cyber sphere to be, you know, I think side by side with each other, right, you have to have the same priority, as part of your planning or, you know, of your business plan. And I think the fifth thing is also kind of that return on the investment, right? Oh, I, you know, sometimes it's very difficult for, you know, organization, for example, I turned Microsoft wants to go talk to, you know, company about cybersecurity. And, you know, sometimes they say, Well, you know, what's the Oh, you know, how do you prove that return on investment? Right? So it's I always telling people, it's like, you're buying insurance, right, you know, you got to buy insurance to cover yourself in case something happened, right, you are protected, or you're, you know, at least you're good coverage. And that's kind of some was similar to kind of like, you know, cybersecurity for the, you know, ICS or the industrial control environment. Now, of course, I think that the other big challenge, you know, we are seeing a lot lately, it's also some of this regulation or compliance, right. Or some of the executive order, you know, from the government, right. So, for example, the recent executive order from President Biden, right, also, you know, making as I think, some kind of guideline for organizations to start to put in place a cybersecurity plan for the, you know, critical infrastructures. And so, those are some big, you know, interesting, but also, regulation, that is a big challenge for many businesses. So, I would say this is someone that big four or five items that you know, is really a big challenge for many organizations. Alright, listeners,</p>
<p>09:54</p>
<p>let's let's summarize real quick on what we're talking about here. The first one is Lack of domain knowledge, big business challenge. It ot convergence. Absolutely agree with that. Legacy liability, that's number three. Note that out that's, that's really interesting organizations in pursuit of economic benefits versus that need to look at their cybersecurity element. Number five would be the return on investment ROI, sort of from a cyber perspective, and companies or customer perspective, difficulty in trying to quantify the value of cybersecurity. And finally, number six, the regulation and compliance and, of course, executive orders coming out of DC that are requiring businesses to implement or have guidelines. Very important. Let me let me go back back to the number one, when we start talking about lack of domain knowledge, how do we solve that? What do we do to solve lack of domain knowledge?</p>
<p>11:07</p>
<p>Yeah, I think there are a lot of things that I think our organization can do, right, you know, for example, as an industry, right, you know, we are started to, you know, go out there, and really educate and train organization about cybersecurity, but also, you know, out of the university and some of the college right, where, you know, you just started to see many, you know, I was a university start to provide training, education and certification or program, our degree program on cybersecurity. Right. So I think that's one way that we can actually really increase the level of I think, you know, expertise out there. So I think that will be very helpful. I mean, today, I think we have probably more than a million plus, you know, I was a cyber security, I have not been filled in, I think that will really help by by having more expertise out in the field. So that's one thing. Hold on, hold</p>
<p>12:04</p>
<p>on, I have to interrupt you just about a million plus openings. Did you say?</p>
<p>12:10</p>
<p>Yeah, I think last year, when I look at the numbers, you know, from some statistics indicate that there are more than a million jobs that need to be filled, when it comes to cybersecurity. Right. And, and that's really a challenge for organization because especially when understanding both the it and ot environment, because, you know, having it scale is one thing, but having both the it and ot or industrial control, cybersecurity expertise. And, you know, I think experience is that's a really big one.</p>
<p>12:44</p>
<p>What do we do about it? And I'm going on to the next one, I like how you answered number one. Number two, how do we address and gain greater synergies between it activities and ot activities?</p>
<p>13:00</p>
<p>Well, I think that there's a couple of things that I think organizers can do, right? Typically, traditionally, you don't have this, I was a conversation between these two groups, right. And they had to be more collaboration, right between the IT organization or the organization, and that need to happen. And that mean, it required, you know, let's say, doing the planning in cybersecurity together and make sure that both sides coming to the table, I have that conversation, understanding the roles and responsible who need to do what, and define clear guidelines for everybody, so then that's really gonna be able to help people on that area. In terms of this, you know, I think, roles and responsibility between it ot I think the other way to do it also is, you know, I think, you know, organization need to be to fully right, understand that cybersecurity, it is not just a it issue, when I ot issue, right, you need to really have a holistic understanding of what happened on both environment. And that also need to happen, right? I think when we start having some this conversation that you're going to be able to solve some of these, the issue right, understanding this is not just in it otas you may as a company issue. So those are some of the few things</p>
<p>14:21</p>
<p>yeah, no, you're spot on there, Richard. And what I see as a result of this, it is what it is it's industry for Dido, it's digital transformation. And if you're a company, if you're a manufacturer, if you're in water you whatever you're in, you're going to have to have that that that ability to collaborate and then have that holistic view if you want to go down the you know, digital transformation journey. It just is. No the way</p>
<p>14:49</p>
<p>Yeah. Let's talk in. Yeah, no, no, I say it's difficult for to to really address a cyber security by just looking at one little one side. You know, only, you have to have a holistic view.</p>
<p>15:02</p>
<p>I like that. Let's talk about legacy liability. What are we, outside of getting new computers? What do we do about legacy liabilities? What's the solution?</p>
<p>15:16</p>
<p>Well, you know, I think some of these environments, especially in industrial controls are some of the system have been around, you know, for decades, right, and they were never really designed to, you know, kind of reprise or you, you know, was never really part of that design or implementation. Beginning. So, some of the systems probably going to continue to go on for the next hour, you know, maybe five to 10 years, right, until a new system are put in place. And so I think there are some, you know, things that organization can do, right, you know, for example, some of these environment, even though they're running, let's say, you know, Windows seven, or Windows XP, and they are, your technology capability can help address some of this issue. Like, for example, if you have an HDMI machine running Windows seven, right, even though a lot of vulnerability, or require some patches, or there is whitelisting, or lockdown solution out there in the market that you can actually deploy in some of the systems in lockdown, or their audit type, or let's say, you know, IPS capability that you can actually put in front of some of these box, so they can filter all this traffic and make sure that they are, you know, being, you know, check and verify for any potential risk to the someone's Hmm, machine, right. So, so those are some of the things that I think company can do to address some of this, then probably last but not least, really kind of, you know, make sure that the security solution that are put in service, Environmental Design, right in the way that is for this kind of environment, right, you cannot just go down, and you know, try to, you know, pick up some, you know, it product and expect it to work on some of these, you know, industrial control systems, right. And so, you know, building an adaptable or you know, you know, adapted solution that can, you know, easily adapted to the existing infrastructure or this existing environment, I think that will be very helpful. So, those are some of the two or three things I think organization can do. Right. And they are all the things that I think, are tools and technologies, are there already as well.</p>
<p>17:24</p>
<p>Is it important to be able to understand, like, from, from, as I look at inventory to understand those vulnerabilities out there, those old legacy systems, those legacy liabilities? Is it important for us to have that, that understanding and then develop a strategy with that?</p>
<p>17:45</p>
<p>Yes, I think it's very important to understand, you know, what's going on in your networks and your environment, I think it will very helpful for you to, you know, build a good strategy or any plan to to address them in cybersecurity, right. And I think, you know, in the, you know, I would say the last couple of decades, we really more talk more tea, right, and we are all this shadow IT system, you know, bringing our BYOD stuff with that, you know, into the company. And that's also create a lot of challenge. As we go into this similar trance transformation on the, you know, the industrial control side, we will have shadow ot right, and so having a very good visibility across all these different devices. And in your organization, you know, what, how your network construction look like, I think that will really help you to plan a good cyber strategy from top to bottom.</p>
<p>18:41</p>
<p>How do you this is number four, how would you address businesses are going to always look at the economics of whatever project they're putting in place, they're going to say, we do this, we get this benefit, this economic benefit? How do we start to incorporate the necessity to bring in the cybersecurity conversation at the beginning of these conversations?</p>
<p>19:08</p>
<p>Yeah, I think that's a very important question, Scott. And, you know, I always tell folks, at least people that I speak to that, you know, cybersecurity should be part of your, you know, planning, right, is part of that early planning process, and be baked into your overall strategy. Right. And, you know, and you will be able to basically see the return as you start to implement some of this plan, you know, on the, I guess, on your strategy, or as part of the implementation plan.</p>
<p>19:51</p>
<p>I believe that it's, it's,</p>
<p>19:54</p>
<p>yeah, go ahead. Yeah. So I think like, for example, Maybe in order for us to really show them, you know, the economic right that, you know, cybersecurity can add value, right? We talked about the planning, but also, you know, we can show that, you know, having a cybersecurity strategy in place, and, you know, we can show, you know, instead of showing maybe the sea level, you know, people just a bit and by by really kind of tell them that, hey, you know, if your system go down for X number of weeks, or months, or days, right, here is a cause for, let's say, production, or here's the cost for having your system to go down, right? If you can show those kind of economic numbers, I think that will be quite beneficial. And so this way that we can do that there are in a model, you are the organization create the show that,</p>
<p>20:54</p>
<p>you know, and that's in line with number five, that is the ROI. I mean, yeah, you might invest something, it's hard to quantify it. But it's easy, from my perspective, to see the risk that exists out there, and how it applies to your business. And if your business goes down for a period of time, how much money you're in that business to ensure that assets stays up and productive.</p>
<p>21:22</p>
<p>Right. I mean, especially on the industrial control, sir. I mean, I think the keep the operation from running as a big critical issue, and the safety and reliability of the system. I mean, those are probably two of the most important, especially on the industrial side of things.</p>
<p>21:41</p>
<p>Last question, and this is with the number six, that regulation and compliance. How is Trend Micro sort of leading the way because just like anything else, whatever comes out of Washington might be some sort of, you know, sketch, but it requires companies and organizations like Trend Micro yourself and professionals to be able to say, oh, what do you guys do in there to help businesses understand that regulatory and compliance edict?</p>
<p>22:15</p>
<p>Well, there are a couple things that we are doing, especially when you have, you know, regulation and compliance like this, you know, out of, you know, say, DC write a couple things I want, you know, we work with our partners, right, try to truly understand what are the requests? And what are the guideline from the orders, and then we will work with this partner to understand that and try to write requirements and plan to address some of these, you know, you know, requiring so for example, that requirement actually came, and I think the reason is deco came in, and I think they requested for like Sisa, right, or, you know, some organization to come up with some kind of best practice, right? And in there, there are some recommendations about, okay, what type of security controller you need to put up in place to address this particular issue or challenge, right, and they will provide that recommendation, right. And then we, as a security provider, we actually come in, and we say, all right, for, let's say, activity, A and B, right, we have this type of security control that address those two, you know, requirement, you know, stuff like that. So, that's what we've been working on. And, you know, working with our partners to do that. The other thing is that we're also actively basis basically tried to understand exactly what each of those, you know, a day requirement coming from, you know, to the government, right, and, you know, we will work with that our product development organization to make sure that all security solutions are designed in such that will address some of this concern, right. So, you know, one of the big things they talk about on critical infrastructure is what I bought, like some of the SCADA system and how do you lock down somebody's system, right, well, how do you protect somebody's system? Well, and now we basically tried to figure out what the best way to lock down and say, Hmm, machine running, you know, Windows XP, right? Well, there's a couple ways one, you could, you know, put a lockdown solution that you can actually like down the system, make sure that nothing can be you know, compromised or nothing can be run on that system. Because typically the system designed such that only Allah type applications run as you can do that, that's only a first step in helping the customer or to adjust them this executive order is, um, this requirement. So those are spirit thing that we are doing in terms of these orders. Is there going to be a validation that they comply with the guidelines, the new guidelines, the executive orders? Well, I haven't see any enforcement yet, right? I mean, I think today, most of those guidelines are more of a guideline and make sure that organization or start to put some of these in place, especially if it wasn't as critical infrastructure. They're affecting, you know, I think our economy, right, so those are guidelines. I don't know, if you know, when that's gonna become, you know, something that will be enforced. You know, I think there are certain verticals, you know, I think they may, right, need to be enforced, right? To make sure, you know, organizations start to implement, you know, for example, like Les Paul in water, right. Energy, right. Those are, you know, critical infrastructure, you know, that it can only copy. So, by this for now, I think that there isn't any, you know, enforcement yet. It's more of a guideline.</p>
<p>25:53</p>
<p>All right, let's summarize this incredible conversation. We've got six key points, lack of domain knowledge, these are business challenges, it ot convergence, they need to collaborate, need to have that that desire to look at your business holistically, legacy liabilities, of course, that is a big important component. But there's ways of being able to lock down that we're looking at the pursuit of economics versus the cyber side. But that has got to be done at the beginning of this conversation, which then rolls into the ROI, because you don't want your asset to be sort of just sitting there falling apart because of being compromised. And the last one, of course, is regulatory regulation, compliance, and of course, the new guidelines. Did we leave anything else out? All right. All right. Well, I know so good. Yeah. Yes. Okay. Well, thank you, Richard. That's an incredible, incredible value for the listeners out there. Let's put it this way. If you're in the world of digital transformation, if your business is going down that, that avenue, you need cybersecurity, whether you like it or not, and that conversation has to happen at the beginning. And you're going to have to figure out what your legacy systems are your legacy liabilities, and, and address those as well. So that your asset is up and running and doing what it needs to do. All right, Richard, thank you very much. Thank you, Scott. All right, we're gonna also have all his contact information, if you want to connect with him, which I highly recommend. It'll all be out on industrial talk.com. You're listening to the industrial talk, Podcast Network.</p>
<p>27:50</p>
<p>Alright, this is, once again, podcast number two in our cybersecurity, love best, whatever you want to call it, because you need it. Because you need to be engaged in your digital transformation journey, everything that's associated with that. And cybersecurity has to be at the very top of that conversation. All right, if you have not, you got to find out about podcast number one, it's out on industrial talk.com. Again, because cybersecurity is so doggone important. We've got an event. It's out there it is covering all time zones, right? So it's June 15, and June 16, depending on where you're at. But I've got the link out there on industrial talk comm so fair not find the place that you're, you're at, and it's going to be featuring Eva Chen, and she is the co founder and CEO of micro trend, micro very important, very important conversation. All right. Be bold, be brave, dare greatly hang out with people who are bold and brave and daring greatly and you will change the world. We're gonna have another great cybersecurity podcast right around the corner. So stay tuned.</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/richard-ku-with-trend-micro-and-txone-networks-talk-about-cyber-security-challenges-with-digital-transformation/">Richard Ku with Trend Micro and txOne Networks talk about Cyber Security Challenges with Digital Transformation</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://industrialtalk.com/episodes/richard-ku-with-trend-micro-and-txone-networks-talk-about-cyber-security-challenges-with-digital-transformation/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://podcasts.captivate.fm/media/c01ab1bb-8e57-4ab6-a46b-b2837e25a095/tm-podcast-2-w-richard-ku.mp3" length="34654945" type="audio/mpeg" />

			</item>
		<item>
		<title>Richard Ku and Ryan Flores with tx One talk about Industrial Cyber Security Threats, Challenges and Risks</title>
		<link>https://industrialtalk.com/episodes/richard-ku-and-ryan-flores-with-tx-one-talk-about-industrial-cyber-security-threats-challenges-and-risks/</link>
					<comments>https://industrialtalk.com/episodes/richard-ku-and-ryan-flores-with-tx-one-talk-about-industrial-cyber-security-threats-challenges-and-risks/#respond</comments>
		
		<dc:creator><![CDATA[Scott MacKenzie]]></dc:creator>
		<pubDate>Fri, 11 Jun 2021 15:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://industrialtalk.com/captivate-podcast/richard-ku-and-ryan-flores-with-tx-one-talk-about-industrial-cyber-security-threats-challenges-and-risks/</guid>

					<description><![CDATA[<p>In this week's Industrial Talk Podcast we're talking to Richard Ku and Ryan Flores with txOne Network and Trend Micro about "Cyber Security Threats, Challenges and Risks in the Industrial Control Environment".  Get the answers to your "Industrial Cyber Security" questions along with tx One's unique insight on the “How” on this Industrial Talk interview!</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/richard-ku-and-ryan-flores-with-tx-one-talk-about-industrial-cyber-security-threats-challenges-and-risks/">Richard Ku and Ryan Flores with tx One talk about Industrial Cyber Security Threats, Challenges and Risks</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="cfm-player-iframe" style="width: 100%; height: 170px; margin-bottom: 20px; border-radius: 10px; overflow:hidden; border: 1px solid #d6d6d6;"><iframe style="width: 100%; height: 170px;" frameborder="no" scrolling="no" seamless allow="autoplay" src="https://player.captivate.fm/eedf6f6f-b41a-433c-96bf-c1b88e07dc71"></iframe></div><p>In this week's <strong><em>Industrial Talk Podcast</em></strong> we're talking to <strong>Richard Ku and Ryan Flores </strong>with txOne Network and Trend Micro about <b>&#8220;Cyber Security Threats, Challenges and Risks in the Industrial Control Environment&#8221;</b>.  Get the answers to your &#8220;Industrial Cyber Security&#8221; questions along with tx One's unique insight on the “How” on this Industrial Talk interview!</p>
<p>Trend Micro Event:  Cyber Security Perspectives.  Hold Your Seat <a href="https://perspectives.trendmicro.com/?_ga=2.70356185.832642918.1623267552-1558506737.1620854188" target="_blank" rel="noopener">Here</a>.</p>
<p><iframe loading="lazy" title="Trend Micro Perspectives - June 2021 - Digital Transformation Insights for Security Leaders" width="500" height="281" src="https://www.youtube.com/embed/jjVYi2OIBG8?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<p>Finally, get your exclusive free access to the <a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener noreferrer">Industrial Academy</a> and a series on “<a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener noreferrer"><strong>Why You Need To Podcast</strong></a>” for Greater Success in 2020. All links designed for keeping you current in this rapidly changing Industrial Market. Learn! Grow! Enjoy!</p>
<h2>RICHARD KU'S CONTACT INFORMATION:</h2>
<p><strong>Personal LinkedIn: </strong><a href="https://www.linkedin.com/in/richardku1/" target="_blank" rel="noopener">https://www.linkedin.com/in/richardku1/</a></p>
<p><strong>Company LinkedIn: </strong><a href="https://www.linkedin.com/company/trend-micro/" target="_blank" rel="noopener">https://www.linkedin.com/company/trend-micro/</a></p>
<p><strong>TX One Networks Company Website:</strong> <a href="https://www.txone-networks.com/en-global" target="_blank" rel="noopener">https://www.txone-networks.com/en-global</a></p>
<p><strong>Trend Micro Company Website: </strong><a href="https://www.trendmicro.com/en_us/business.html" target="_blank" rel="noopener">https://www.trendmicro.com/en_us/business.html</a></p>
<h2>RYAN FLORES' CONTACT INFORMATION:</h2>
<p><strong>Personal LinkedIn: </strong><a href="https://www.linkedin.com/in/ryan-flores-4800b8a/" target="_blank" rel="noopener">https://www.linkedin.com/in/ryan-flores-4800b8a/</a></p>
<h2>PODCAST VIDEO:</h2>
<p><iframe loading="lazy" title="Richard Ku and Ryan Flores w tx One discuss Industrial Cyber Security Threats, Challenges and Risks" width="500" height="281" src="https://www.youtube.com/embed/5KsNVS6qH7w?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<h2></h2>
<h2>Other Powerful Cyber Security Resources:</h2>
<p><a href="https://iiot-world.com/our-team/our-contributors/richard-ku-sr-vice-president-of-product-services-management/" target="_blank" rel="noopener">https://iiot-world.com/our-team/our-contributors/richard-ku-sr-vice-president-of-product-services-management/</a></p>
<p><a href="https://iiot-world.com/ics-security/cybersecurity/iiot-world-days-track-ics-security-bringing-order-to-ics-cyber-chaos/" target="_blank" rel="noopener">https://iiot-world.com/ics-security/cybersecurity/iiot-world-days-track-ics-security-bringing-order-to-ics-cyber-chaos/</a></p>
<p><a href="https://iiot-world.com/ics-security/cybersecurity/industrial-cyber-security-why-it-ot-collaboration-is-no-longer-an-option-but-a-necessity-2/" target="_blank" rel="noopener">https://iiot-world.com/ics-security/cybersecurity/industrial-cyber-security-why-it-ot-collaboration-is-no-longer-an-option-but-a-necessity-2/</a></p>
<p><a href="https://iiot-world.com/industrial-iot-cybersecurity-from-the-shop-floor-to-the-board-room/" target="_blank" rel="noopener">https://iiot-world.com/industrial-iot-cybersecurity-from-the-shop-floor-to-the-board-room/</a></p>
<p><a href="https://iiot-world.com/ics-security/cybersecurity/9-best-cybersecurity-practices-itot-environment/" target="_blank" rel="noopener">https://iiot-world.com/ics-security/cybersecurity/9-best-cybersecurity-practices-itot-environment/</a></p>
<h2>THE STRATEGIC REASON &#8220;WHY YOU NEED TO PODCAST&#8221;:</h2>
<p><a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-content/uploads/2020/02/Why-you-need-to-Podcast-Graphic-2.png" width="1024" height="538" /></a></p>
<h2>OTHER GREAT INDUSTRIAL RESOURCES:</h2>
<p><strong>NEOM</strong>:  <a href="https://www.neom.com/en-us" target="_blank" rel="noopener noreferrer">https://www.neom.com/en-us</a></p>
<p><strong>CAP Logistics:</strong>  <a href="https://www.caplogistics.com/" target="_blank" rel="noopener noreferrer">https://www.caplogistics.com/</a></p>
<p><strong>Hitachi Vantara:</strong> <a href="https://www.hitachivantara.com/en-us/home.html" target="_blank" rel="noopener noreferrer">https://www.hitachivantara.com/en-us/home.html</a></p>
<p><strong>Industrial Marketing Solutions:</strong>  <a href="https://industrialtalk.com/industrial-marketing/" target="_blank" rel="noopener noreferrer">https://industrialtalk.com/industrial-marketing/</a></p>
<p><strong>Industrial Academy:</strong> <a href="https://industrialtalk.com/industrial-academy/" target="_blank" rel="noopener noreferrer">https://industrialtalk.com/industrial-academy/</a></p>
<p><strong>Industrial Dojo:</strong> <a href="https://industrialtalk.com/industrial_dojo/" target="_blank" rel="noopener noreferrer">https://industrialtalk.com/industrial_dojo/</a></p>
<p><strong>Safety With Purpose Podcast:</strong> <a href="https://safetywithpurpose.com/" target="_blank" rel="noopener noreferrer">https://safetywithpurpose.com/</a></p>
<h2>YOUR INDUSTRIAL DIGITAL TOOLBOX:</h2>
<p><strong>LifterLMS:</strong> Get One Month Free for $1 – <a href="https://lifterlms.com/" target="_blank" rel="noopener noreferrer">https://lifterlms.com/</a></p>
<p><strong>Active Campaign:</strong> <a href="https://www.activecampaign.com/?_r=H855VEPU" target="_blank" rel="noopener noreferrer">Active Campaign Link</a></p>
<p><strong>Social Jukebox:</strong> <a href="https://www.socialjukebox.com/" target="_blank" rel="noopener noreferrer">https://www.socialjukebox.com/</a></p>
<h2>Industrial Academy (One Month Free Access And One Free License For Future Industrial Leader):</h2>
<p><a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-admin/wp-content/uploads/2019/10/Industrial-Academy-Graphic.png" width="1024" height="538" /></a></p>
<h2>Business Beatitude the Book</h2>
<p><img loading="lazy" decoding="async" class="alignleft" src="https://industrialtalk.com/wp-content/uploads/2019/10/BB-Book-Cover.png" width="138" height="215" /></p>
<p class="ql-align-center">Do you desire a more joy-filled, deeply-enduring sense of accomplishment and success? Live your business the way you want to live with the BUSINESS BEATITUDES&#8230;The Bridge connecting sacrifice to success. <strong>YOU NEED THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><strong>TAP INTO YOUR INDUSTRIAL SOUL, RESERVE YOUR COPY NOW! BE BOLD. BE BRAVE. DARE GREATLY AND CHANGE THE WORLD. GET THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><a href="https://industrialtalk.com/business-beatitude-reserve/" target="_blank" rel="noopener noreferrer"> Reserve My Copy and My 25% Discount</a></p>
<h2>PODCAST TRANSCRIPT:</h2>
<p><strong>SUMMARY KEYWORDS</strong></p>
<p>cybersecurity, trend micro, industrial, people, industry, organizations, network, business, ryan, attackers, cyber, important, pay, attacks, Iot, ransomware, richard, colonial, challenges, gain</p>
<p>00:04</p>
<p>Welcome to the industrial talk podcast with Scott MacKenzie. Scott is a passionate industry professional dedicated to transferring cutting edge industry focused innovations and trends while highlighting the men and women who keep the world moving. So put on your hard hat, grab your work boots, and let's get</p>
<p>00:21</p>
<p>All right. Welcome to the industrial talk podcast, the number one location for all things industrial. Yep, industrial talk, go figure. We talked industrial. We've got a five part series, a five part series that focuses in on industrial cybersecurity, we're going to be featuring some incredible at trailblazers, let's put it that way in the world of cybersecurity, and I believe, and I think you believe if you're going down this world of digital transformation, and you want to take advantage of industrial for Dotto, you need at the forefront of this particular decision, this strategic decision to help create greater resiliency in your business. cybersecurity, let's get cracking. So, yeah, I, I've been very fortunate. And of course, you know, as well as I do, that there's a lot of conversation out there about cyber security, you have the colonial pipeline. And so industrial talk as a whole wants to be this just a central location for industrial related information. So you don't have to go around. We want to promote events, we want to promote individuals that are speaking at these events, we want to facilitate this knowledge, because we believe that education is it, education, collaboration, and innovation is where success will be in the future. And that's just a reality of it. So I mentioned briefly about this particular five part series, this is the first of five, this is cybersecurity threats, challenges, risks in industrial control environments, and this just came out after the colonial pipeline, which on the industrial talk website, we will have a white paper that was produced by incredible people at trend, micro and Trend Micro sponsoring this particular series, they are fabulous to work with a. I mean, when you think about cybersecurity, when you think about all the stuff that has to be thought of and, and how they facilitate this digital transformation. They're not meant to get in your way. They're, they're meant to make sure that that your life is not interrupted by unfortunate situations within cybersecurity. That's what Trend Micro is all about. Now, number two in this particular series will be industrial business and tech, not technical challenges facing industry. Number three cybersecurity best practices, number four, industrial cyber solutions, which is pretty cool. And then finally, CEO, CEO talk. So we're gonna have a conversation on I mean, we've just got to recognize that this is important now, because I'm all about getting that information out there is an event. This is an event that is featuring and Trend Micro, it is a live event, it is June 16. This is for the Americas June 16. It is from 11am to 4pm. Eastern Time, and they're going to be talking all things cyber, because it's important. It's like the the the topic is ready for a new perspective, don't miss this exclusive one day virtual event. And it's going to be featuring the CEO of Trend Micro and then a gentleman by the name of Neil McDonald, VP and distinguished analyst at Gartner. How about that. And if you're not if you're in Europe, they have one for you, too. It's on June 16. But it's 10am to 3pm. And then if you're in the Middle East Africa and Mediterranean, same thing, June 15 11am, to 4pm. And then finally an Asia Pacific 10am to 3pm. A go out and I'll have the link. Don't worry about it. I'll have the link out there. But I think that this is an important conversation to have. I think you need to be a part of it. I think you need to hear from leaders within this space because well,</p>
<p>04:26</p>
<p>if you want that digital transformation journey, if you want to embrace that, if you want to reap the benefits associated with all of that, you need to have a sound and strong cybersecurity strategy, Trend Micro reach out to them. Alright, this particular podcast which we're going to convert into the industrial Academy, because I think it's a it's a series that warrants an industrial Academy type of approach. So this particular podcast we're going to be talking about cybersecurity threats, challenges and risks to industrial Control environment, it features a gentleman by the name of Brian Flores as well as a Richard Kuh. bolt with Trend Micro enjoy. Ryan and Richard, thank you very much for joining the industrial talk podcast listeners, what we're going to be talking about is cyber security threats, challenges and risks in the industrial control environment. I don't know where you set on that, and then anything cybersecurity, but that for that particular topic is dead sexy. I am excited about having this conversation. For the listeners and Ryan, give us a little background on who you are level set, figure out who you are. And then then we're gonna go to Richard, do the same thing. And then we're gonna go into that topic.</p>
<p>05:42</p>
<p>All right. Hi, everyone. I'm Ryan florists. I'm happy to be here. I've been working in the cybersecurity space for more than a decade now. Investigating attacks and incidents. So you know, the recent attacks that have been happening, it's some quite close to my passion. And in my field.</p>
<p>06:06</p>
<p>It's interesting. I, I'm looking at your stat card out on LinkedIn, you've been with Trend Micro for 18 years. Oh, yeah. Oh, yeah. Why don't you just start at age one?</p>
<p>06:16</p>
<p>No, no. Um, yeah. Right on it right out of college? Oh, yeah. So if I just one of those young guys that are doing reverse engineering, you know, solutions for viruses and malware that are coming around, and then, you know, progressed to, to looking at cyber criminals and the other technologies and infrastructure that, you know, that is being used, and that is emerging. So I'm excited, we are excited to be in the space.</p>
<p>06:49</p>
<p>I'm telling you, you have a tiger and you got to hold on to that tail, because it's they're very creative people out there very nefarious individuals that never stop thinking about how to, unfortunately, gain access to where they're not supposed to gain access. All right, Richard, give us a little background on who you are, and why you're such an incredible cyber guy.</p>
<p>07:11</p>
<p>Thank you, Scott. Yeah, so I've been around in the cyber security space for a little bit over 30 years. And, you know, over the last, I will say, five years or so I've been very focused on, you know, I just had no development and understanding of, you know, cybersecurity in the industrial space. But I am, you know, in the cybersecurity for more than 30 years, with the company. Previously, I involved in a lot of product development, a lot of research. So, yeah, I've been very passionate about, you know, cyber security, specifically on the industrial area, right, because I think over the last, you know, couple years, we have been having a lot of challenge, you know, especially in some of the critical infrastructure. And so we're going to talk about that a little bit more, but I'm excited to be here.</p>
<p>07:59</p>
<p>Yeah, here's the interesting part. You know, there's that the good side, bad side, double edged sword type of thing with this digital transformation journey, right? It just is. Yeah, you leverage the the available. innovation that exists out there that give you greater insights into what your business is doing. But then again, again, you're opening up areas of weakness, potentially, if you're not a business, if you're not an industrial business, not thinking about, Hey, this is great IoT stuff. What's that cyber side? Ryan, let's talk a little bit about, from my perspective, just lay the foundation of what I say, what's a cyber one, what is a cybersecurity threat? What does that mean? And why are people interested in trying to gain access to the industrial, you know, infrastructure?</p>
<p>08:54</p>
<p>Yeah. So, um, basically, a cyber threat is something that can, uh, adversely affect your network or your digital assets, right. So it can be something in a more traditional IT network, it can be like the server, it can be a user account that has access to certain information. And in other networks, like in an OT network, that can be an ICS endpoint that is responsible for controlling a certain process or monitoring certain conditions, right. But the thing that we've learned in, you know, in studying these kind of attacks, is that a lot of times the attackers don't don't really target or maybe they don't have an initial idea who they were able to compromise or gain access to, is just that, they learn about it when they are able to gain access, and then Okay, this looks like an important company. This looks like an important server in the network, I'm going to attack it, ransom, ransom it. So, and then I think like, for example, in colonial attack, right, the attackers even admitted that they were not aware of the impact of of that back that they have done.</p>
<p>10:20</p>
<p>So, again, let's get into the psychology of it. Why Why? Why is that appealing? To some? It's like, I know, I don't outside the fact that I'm, I might be considered lazy, but I don't sit around saying how do I, you know, penetrate get into? for no reason. It's like, Oh, yeah, I don't understand what's the psychology behind that.</p>
<p>10:47</p>
<p>It's it's just the money. Um, it's, it's a business out there. Um, so a lot of the attacks that are happening right now is its monetary driven, they plan to gain profit from the attacks on either via extorting for, for the files that that has been, or the network that has been held ransom, or by by by blackmailing that, hey, if you don't pay me up, I would I would reveal this information, this, this data that I have on you that I have stolen from your network, or are building up a supply value chain in the cybercrime underground network, meaning, if I, for example, have stolen several credentials, and it's quite important, I can then resell this to somebody else who might be interested in this credentials for later use. So it's really an economy out there and everything is doing with money. So</p>
<p>11:55</p>
<p>we can add it right. Because I think if you look at the history of cyberthreat, right, yeah, back in the 90s, right, most of these cyber incident or threat is really coming from I think, you know, kids or college students, and, you know, laboratory, right, that's kind of early 80s and 90s. Right, and it's proving they can do it, but then as over time, right, and you start to see these, all these digital transformation, and people are starting to see that there's a, you know, economically gain from it, right. And so, all these you know, you know, attack, or these hackers now try to basically transform their business model right, from not just, you know, I tried to prove they can do it, but now they are, you know, really focused on monitoring gains and gaining access to, you know, confidential information. So all those underground, right, and that whole underground market. Oh, it is the economy, actually is quite big. I mean, it's probably a couple of trillion dollars in terms of the whole economy underground. Right. And so, well, then it's easy for them to make money, right. I mean, you know, we work. Yeah, it's easy for them. So,</p>
<p>13:04</p>
<p>the T word, oh, my jaw just dropped. I said, I can't you dropped a trillion on that</p>
<p>13:12</p>
<p>hole, maybe 100 billion, you know, I can't remember the exact number. But the last look, it was something like, I can't remember Ryan. But what something two or $300 billion, or something economy or something. Right. So it's more on the beat, not on the team? Yeah.</p>
<p>13:29</p>
<p>Holy cow. Yeah. I better get I better sharpen up my skills. If that's the case. No, no, don't even don't even contact me and say that. Okay. So, me, business owner, I'm still very confused. And the reason I'm confused is, is where are the laws that in this case, let's let's let's use the the elephant in the room. Let's just take a take that, for example, you got this ransomware situation on colonial pipeline, it is impacting me, and it's impacting a lot of people around the United States. And they I guess, they tracked it back to Russia and all of this good stuff. What What do we do we we pay for that extortion? What What do we do?</p>
<p>14:16</p>
<p>What are the laws? Unfortunately, a lot of victims actually opt to pay or not a lot. You know, a significant number of victims pay because it's it's also difficult for them to to recover. Once, for example, your network is hacked. They also they also play the economic game, right? So it takes us one month to recover and pay this amount of money to contractors to software licenses and everything like that instead of just paying it so they have you know, they did have to juggle that with the time constraints that they also have.</p>
<p>14:58</p>
<p>Yes. Now I understand it's like, boom, incident happens ransomware bring where we've got a problem. Now the decision on the business side is like, okay, we can pay it. Okay, I see it, or I haven't got to find somebody or some company or some entity to remove it has a price. This has a price. And you got to look at it. from that. That point of view. Yes. Oh, that's ugly. I'm sorry.</p>
<p>15:32</p>
<p>Oh, yeah. And that's really difficult, especially in in industrial environments, because you also need to factor in, you know, last time. Yes, right.</p>
<p>15:42</p>
<p>Yes. So let's, let's, let's sort of pull on that string a little bit with the colonial pipeline ransomware. Do you by chance, Ryan have any insights into what what took place with that event?</p>
<p>15:59</p>
<p>Alright, so I'm not going to speak about anything that I don't factually know. But for example, it's been known that these ransomware groups don't operate by themselves, they have other affiliates or partners that would do the actual hacking for them. And they just, you know, it's like, commission based, you install a ransomware into a compromised network, we don't do the compromise ourselves. We don't do the hacking ourselves. But if you've managed to hack the network, contact us, and you'll get a cut of whatever profit we make from that. So there's also like a, you know, tiered model there. And then it's also depends on whom they're able to, to hack or compromise. If it's a bigger company, they would ask for a bigger ransom. If it's a smaller company, you know, they actually judge the cup the capability to pay of the victim. So and how would the initial compromise or hack happen? several things. There are there might be unpatched systems that are exposed to the internet, there might be, you know, fished user accounts, user credentials, that attackers were initially able to gain access to, or there might just be some security misconfigurations that are made available, or, you know, the hacker was able to, by happenstance, able to access and these things happen, and we've seen, you know, all of these things played out in previous incidents.</p>
<p>17:41</p>
<p>So this is it. This is unnerving. Right? You and others would turn micro, this never stops, right? No, they don't just say, Hey, guys, Trend Micro there, they've, they've pretty much should protect everything. And so we might as well just shut it down. That's not the case. They're gonna continue to try to figure out ways of penetrating these because the financial rewards are too great.</p>
<p>18:14</p>
<p>Oh, yes, definitely. That's why for example, you know, one of the push is not just for, for having security products, but also having people in, in the industry advocate for more cybersecurity, or tailored cybersecurity for this particular niche, right. Industry niche. Yeah, and also having people in the industry, talk to each other share information, share best practices, in order to have a higher raise the bar for the attackers, you know, to overcome.</p>
<p>18:49</p>
<p>So I hear what you're saying, I'm uncomfortable, I'm getting. Now if they hack me, I've got $20 out there, I'll pay for it. But that's about it, that I don't have anything beyond that. But let me ask you this. What are the actionable items that we could do today? If I was a business? Give us a little, you know, 123 do these things today?</p>
<p>19:14</p>
<p>All right. Um, yeah. So so one of the things that we've seen is that, um, basic security, hygiene or cybersecurity hygiene is not, or, you know, it's not as widespread as we would have hoped. There's a lot of small companies out there that that have what one ID administrator guy who's managing the whole network, both it and ot network side, and that is not enough. One of the things that, that contribute to that is, is that there's the awareness of the business owner of the magic Assuming that security is important, cybersecurity is important. So I think if we have to start somewhere, we have to put out the word out there that, first and foremost, cybersecurity is important, specially, if you have critical infrastructure and critical equipment process for that you maintain and run, right. And the next step of that would be make the investment, the investment in hiring the right people, and implementing the right technology in order to properly protect all of this assets and processes. And third, would be having good knowledge on what is in your network. A lot of times, what we've seen is that the reason why an attacker is able to enter the network is because there is one computer out there, that has been forgotten that it's not part of the audit, that was just lying there connected to the network, and everybody has forgotten about it. And that was the what the attacker was able to gain access to. So having complete visibility and audit on what assets you have, and what were those where those assets are connected to, and what these assets mean to the network would be, you know, a good step to be able to know, your network and to be able to properly protect the network.</p>
<p>21:32</p>
<p>Yeah, a couple of things as well. I think in addition to you know, Ryan's point, when I speak to many of my customers appointment, there are kind of four key pillars that I typically recommend them, right. And those are, you know, people process technology and culture within an organization, right. And so, I think people play a very important role in cyber security or your cyber strategy, right? If you have a good train, security awareness organization, that can reduce your cybersecurity risk, as well as having the competence peoples and risk to deal with such instances, the employer was I think the people pieces are also very important. And then you know, followed by that process, right, you know, to get a good cybersecurity strategy, you need to have some type of process in place, right, so that you can some kind of governance or some type of auditing, to make sure that you as you implement your cyber strategy, you continue to evolve, you continue to basically make sure that you get improved over time, right, and so a good process in place, and that they're also very good in the technology itself, specifically on the industrial control side, right, in industrial control, because some of these systems have been around for decades, right, and many of this system have, or operating system, you know, it was never designed to have security. So you wanted to build the right security solution implement right solution, is to make sure that the solution, you actually mean to that environment can be adapt, right and work in that environment. Because my experience, we have many customers, where they try to take an IT product and try to deploy it on an OT environment, and does not always solve the problem, because they actually create more problems than, you know, solving it. So understanding technology, right, you know, validate, verify, and make sure the technology can be worked on that environment. And then of course, last but not least, is that culture thing, right? You know, it's, you have to create some kind of like culture, cybersecurity culture within the organization. And, you know, and that will really going to help people to kind of, you know, evolve around and make sure that can be done. Otherwise, you know, people just don't care too much and put us in cybersecurity very low. So, at least those are the on a very big picture with a fundamental thing I think organizations need to consider, and then you talk about what are my cyber security cyber framework need to look at? Right, so</p>
<p>24:04</p>
<p>those are the things very good on both both accounts, very interesting. Now. It makes sense. What are the roadblocks what what are preventing people to do the what is right for their organizations in the world of cybersecurity? What what are they not getting?</p>
<p>24:28</p>
<p>Me? Wrong, you can add? Right, as you know, I think that especially in the industrial sector, there are some definitely business challenges. Right. And, and we can talk about a little bit and also there's some technical challenges, you know, and those are the roadblocks. I think in in especially on the OT world, right, you have kind of four areas that I see it a big challenge. One is that lack of domain knowledge and expertise right especially on you know, in cybersecurity for ot or industrial control side. There's a lack of skill set lack of expertise in that area. So that's one big, I think, kind of issue on that. And then, you know, traditionally you have this conversion between it ot Yeah, you don't have that before I before, which is it, and then ot they are completely separate. But now you have this convergence. And that roles and responsibilities become very unclear as to who need to manage or need to make decision on soon, let's say a cyber incident. Right. And that is also a big, big challenge for many, many organization. And then another piece, is that legacy liability, right? You know, you have all these all environment going around for that? And how do you make sure that you can implement the right technology, the right solution into those environments? So that's a big challenge for them, because maybe this environment being worked and, you know, will continue to work, you know, for the next five or 10 years. Right. And I want to touch it. Right. And, you know, in always a day, it will work in you know, why? Why bought it right? So I think that's a big, you know, obstacle for folks. And I think last but not least, and it is from my perspective is that, you know, organization tend to kind of put ha, I will say priority on the economic side, versus cybersecurity, right, cybersecurity is always going to kind of draw or color the secondary, you know, I think priority. And so, I think that had to change giving someone a very current incident, like from the colonial pipeline, or the solar wind attacks, or even some of the, you know, Microsoft, you know, vulnerability, right. These are, it should be, you know, upfront and impiety for many organizations. So it is those are some of the challenges in know, people maybe last thing is, is that all I write people don't see your return on investment, as you will come to investing in cybersecurity. Right. And so, they want to see the economic and sometimes, you know, you don't see that. So it's those are some of the I think, potential challenges for many organizations. Well,</p>
<p>27:08</p>
<p>I guarantee a colonial knows about the ROI understands the economic impact. That's for doggone sure you have anything to add to that, right.</p>
<p>27:17</p>
<p>Oh, yeah, I think the one thing that I would like to add is that I think there's still big discrepancy you between what the IT people think, and ot people think. And I think it's just a matter of them. Getting into a room together, understanding each other's priorities and what we are they're trying to achieve, such so that the digitization that is happening right now proceeds with security in mind, and also supports both the it objective and the OT objective.</p>
<p>27:53</p>
<p>And that's cultural. None. And, yes, Richard brought that up. And that's a cultural thing. And we've all been in organizations where that, that they don't talk. They they just don't.</p>
<p>28:05</p>
<p>Yeah, unfortunately, you know, in this industry, especially for the industrial control side, right, these people haven't been talking to each other for so so many decades, right. And now, you know, because this convergence is forcing people to have that conversation and talking, and I think it's very difficult, right?</p>
<p>28:24</p>
<p>So I've got a couple of other sort of insights here that I want to ask you guys. First off, let's say I'm a I'm a business. And, and I think Ryan and Richard, you painted a picture that it's a dynamic environment out there, and you got to keep current and you got to constantly consume this information in some way, shape or form. You got to find the organizations to be able to share their story, which is pretty hard when it comes to cybersecurity people are not really sharing information from a business, what's going on? Now? I've got limited, let's say limited resources, fine. Is there a value proposition for what I would call a fractional cybersecurity expert? Like, I can't have a guy on on board? I can't pay that. But I can try to fractionalize and say, I've got I've got somebody over here that keeps current with all the information that's out there. I can draw upon that. There's a it makes sense for my financials, but I'm in the I'm moving forward in a secure or a secure strategy. Is there is there any value proposition there?</p>
<p>29:37</p>
<p>I think I'm within the industry. There are industry specific cert computer emergent emergency response teams. I believe there's ICS cert. that exists, and they are the they would have, they would send regular notices on certain incidents that are happening. that are affecting the industry. So there are organizations out there that do this kind of things that help distill, you know, that stream of information and turn it to the right. Industry and to the right, people. I think also, there's some isaaq type of organizations that is also for for ICS, and to. So I think, you know, if you're a business, and you're, you know, you want to have industry relevant information regarding cybersecurity, it would be best to subscribe into these types of organizations and mailing lists, because, you know, the information that that arrives to us already filtered out, and it would be relevant to your industry.</p>
<p>30:52</p>
<p>We talk about and I think, I think, Richard, you brought it up, which is very important. In in the world of utilities, when we start talking about legacy liability, there are assets out there that are 5060. And beyond years of age, and it still works still current churning along, I see a real challenge to say, how do we create a secure environment for those, and that's also in the water, right? You don't you don't want compromises in the water world, you just don't? And, and given the realities that have taken place recently, with colonial and others? I don't, I want to compress my time. So how do I get ahold of somebody at Trend Micro to help me with my learning curve to get up to a speed where I feel comfortable. And then I can start deploying the things that I need to do to process or begin to think through it. Because I just, if you want this digital transformation, world we want to live in, you cannot ignore the cyber side, cybersecurity side, is there a way of being able to contact Trend Micro?</p>
<p>32:18</p>
<p>Yeah, so, you know, as you know, turnback have been around for over 30 years, right. And we have many partners, as well, as you know, you know, reseller across in the US or across multiple regions are, and, you know, and each of these partners, and, you know, partner, we actually do a lot of training for them, right? available need to buy used to be, you know, person to person in the past, but now we have not online materials, that, you know, anyone can actually come into our website and get that training, and you get that education. And that's available today through our partners or through some our retailers. Right. And, of course, you know, there are tons of information that we are making available for anyone that who are interested in learning more of this, you know, at our website, where you just contact Trend Micro directly, and we'd be happy to send you all the necessary information needed.</p>
<p>33:15</p>
<p>Yeah, out on the trend micro.com website. And I'm looking at everything you've got, it's, it's easily navigate, I can navigate around it, I can see every thing that exists out there, I see partners to see support. I think it's an easy, easy peasy way of being able to sort of begin that education and cybersecurity just because, I mean, let's just let's just lay it on the table. You have to you can't ignore it, right. You're just Yeah, sorry. You might want to, and, but you're gonna have to do it.</p>
<p>33:53</p>
<p>So to add, if you know, our viewers or listeners can just google Trend Micro IoT security, we actually have a dedicated page for IoT security related news and research straight from the research team, such as from my team and other teams inside Trend Micro, and that's, you know, condensed, organized into that single page for the relevant information.</p>
<p>34:20</p>
<p>All right, listeners, we're gonna have all these links, including some of the other resources that they were talking about. So Fear not, you'll be able to find everything you possibly can. There it is. I just, I've been on the the Trend Micro site. I just popped into the Trend Micro IoT security site. Excellent. Yep. resource rich. No complaining, baby. Not. You're not gonna listen to it. If I did complain, I'm already nervous. Yeah. All right. We're gonna have to wrap it up. This and I want to make sure everybody notes this. This is a real important conversation. We're going to continue to expand upon it because we have more in the area of cybersecurity. So, don't, don't just say this is one a done, we've got more that are is very important. This is a very important topic that is meaningful to your business. This was on cybersecurity stretch challenges and risks. Big, big, we're going to give you some links out there definitely. This is going to be an A video, it's going to be often. So learn your cybersecurity. Ryan, absolute wonderful meeting you. Thank you, Scott, for having us. always enjoyed your conversation. Richard, you're all great. Thanks, guys. Awesome job. Yep, thank you. And once again, listeners, we're gonna wrap it up on the other side, we're gonna once again figure out how to can contact with his Jensen and everything that's associated with cybersecurity. You're listening to the industrial talk, Podcast Network. All right, once again, this is number one in a series of five regarding cybersecurity, and digital transformation and why it's important for you, as a manufacturer, as anybody within industry, to reach out to Trend Micro find out more, it'll all be out there on industrial talk COMM And remember, we're going to have this as a featured industrial Academy, learning management opportunity, as well with all of the links, all of the contact, all of the information that you could possibly need to gear up and make sure that you are truly ready to go in your cyber world. Once again, let's talk a little bit about that event that we're talking about. June 16. Put that on your calendar 11am 4pm. I have the links out there. Just Just go out to industrial talk, find the right time zone. But remember, you need to have this conversation. You need to be able to do this. It is exceptionally important. Now, before I go, second podcast, industry, business and technology trends, stay tuned. We're gonna have another great conversation.</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/richard-ku-and-ryan-flores-with-tx-one-talk-about-industrial-cyber-security-threats-challenges-and-risks/">Richard Ku and Ryan Flores with tx One talk about Industrial Cyber Security Threats, Challenges and Risks</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://industrialtalk.com/episodes/richard-ku-and-ryan-flores-with-tx-one-talk-about-industrial-cyber-security-threats-challenges-and-risks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://podcasts.captivate.fm/media/3fc8b0dd-4bd4-49a7-9ca4-52595002d2f2/trend-micro-podcast-1.mp3" length="45726618" type="audio/mpeg" />

			</item>
		<item>
		<title>Mr. Dean Bushey with Hitachi America Talks about The Connected Transportation System</title>
		<link>https://industrialtalk.com/episodes/dean-bushey-with-hitachi-america-talks-about-the-connected-transportation-system/</link>
					<comments>https://industrialtalk.com/episodes/dean-bushey-with-hitachi-america-talks-about-the-connected-transportation-system/#respond</comments>
		
		<dc:creator><![CDATA[Scott MacKenzie]]></dc:creator>
		<pubDate>Mon, 22 Mar 2021 15:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://industrialtalk.com/?post_type=captivate_podcast&#038;p=7461</guid>

					<description><![CDATA[<p>In this week's Industrial Talk Podcast we're talking to Dean Bushey, Transportation and Mobility Expert at Hitachi America about "The Power behind a Connected Transportation System".  Get the answers to your "Connected Mobility" questions along with Dean's unique insight on the “How” on this Industrial Talk interview!</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/dean-bushey-with-hitachi-america-talks-about-the-connected-transportation-system/">Mr. Dean Bushey with Hitachi America Talks about The Connected Transportation System</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="cfm-player-iframe" style="width: 100%; height: 170px; margin-bottom: 20px; border-radius: 10px; overflow:hidden; border: 1px solid #d6d6d6;"><iframe style="width: 100%; height: 170px;" frameborder="no" scrolling="no" seamless allow="autoplay" src="https://player.captivate.fm/66320046-2bb3-43b1-b650-b9160edb5346"></iframe></div><p>In this week's&nbsp;<strong><em>Industrial Talk Podcast</em></strong>&nbsp;we're talking to&nbsp;<strong>Dean Bushey, </strong>Transportation and Mobility Expert at Hitachi America about <strong>&#8220;The Power behind a Connected Transportation System&#8221;</strong>.&nbsp;Get the answers to your &#8220;Connected Mobility&#8221; questions along with Dean's unique insight on the “How” on this Industrial Talk interview!</p>
<p>You can find out more about <strong>Dean and the wonderful team at Hitachi America on innovative solutions for the Transportation Industry </strong>by the links below. Finally, get your exclusive free access to the <a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener">Industrial Academy</a>&nbsp;and a series on “<a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener"><strong>Why You Need To Podcast</strong></a>” for Greater Success in 2020. All links designed for keeping you current in this rapidly changing Industrial Market. Learn! Grow! Enjoy!</p>
<h2>DEAN BUSHEY'S CONTACT INFORMATION:</h2>
<p><strong>Personal LinkedIn:</strong> <a href="https://www.linkedin.com/in/dean-bushey/" target="_blank" rel="noopener">https://www.linkedin.com/in/dean-bushey/</a></p>
<p><strong>Company LinkedIn:&nbsp;</strong><a href="https://www.linkedin.com/showcase/hitachi-global-social-innovation-business/" target="_blank" rel="noopener">https://www.linkedin.com/showcase/hitachi-global-social-innovation-business/</a></p>
<p><strong>Company Website:&nbsp;</strong><a href="https://social-innovation.hitachi.com/" target="_blank" rel="noopener">https://social-innovation.hitachi.com/</a></p>
<p><strong>Company YouTube:&nbsp;</strong> <a href="https://www.youtube.com/channel/UC2qrro8UvaknhG3fsoNxHLg" target="_blank" rel="noopener">https://www.youtube.com/channel/UC2qrro8UvaknhG3fsoNxHLg</a></p>
<h2>PODCAST VIDEO:</h2>
<p><iframe loading="lazy" title="Mr. Dean Bushey with Hitachi America Talks about The Connected Transportation System" width="500" height="281" src="https://www.youtube.com/embed/gx7e6BqJJTs?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<h2>THE STRATEGIC REASON &#8220;WHY YOU NEED TO PODCAST&#8221;:</h2>
<p><a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-content/uploads/2020/02/Why-you-need-to-Podcast-Graphic-2.png" height="538" width="1024"></a></p>
<h2>OTHER GREAT INDUSTRIAL RESOURCES:</h2>
<p><strong>CAP Logistics:</strong>&nbsp;<a href="https://www.caplogistics.com/" target="_blank" rel="noopener">https://www.caplogistics.com/</a></p>
<p><strong>Hitachi Vantara:</strong> <a href="https://www.hitachivantara.com/en-us/home.html" target="_blank" rel="noopener">https://www.hitachivantara.com/en-us/home.html</a></p>
<p><strong>Industrial Marketing Solutions:</strong>&nbsp;&nbsp;<a href="https://industrialtalk.com/industrial-marketing/" target="_blank" rel="noopener">https://industrialtalk.com/industrial-marketing/</a></p>
<p><strong>Industrial Academy:</strong>&nbsp;<a href="https://industrialtalk.com/industrial-academy/" target="_blank" rel="noopener">https://industrialtalk.com/industrial-academy/</a></p>
<p><strong>Industrial Dojo:</strong>&nbsp;<a href="https://industrialtalk.com/industrial_dojo/" target="_blank" rel="noopener">https://industrialtalk.com/industrial_dojo/</a></p>
<p><strong>Safety With Purpose Podcast:</strong>&nbsp;<a href="https://safetywithpurpose.com/" target="_blank" rel="noopener">https://safetywithpurpose.com/</a></p>
<h2>YOUR INDUSTRIAL DIGITAL TOOLBOX:</h2>
<p><strong>LifterLMS:</strong> Get One Month Free for $1 – <a href="https://lifterlms.com/" target="_blank" rel="noopener">https://lifterlms.com/</a></p>
<p><strong>Active Campaign:</strong>&nbsp;<a href="https://www.activecampaign.com/?_r=H855VEPU" target="_blank" rel="noopener">Active Campaign Link</a></p>
<p><strong>BombBomb:</strong>&nbsp;<a href="http://www.bombbomb.com/?bbref=INDUSTRIALTALKPODCAST" target="_blank" rel="noopener">BombBomb Link</a></p>
<p><strong>Social Jukebox:</strong>&nbsp;<a href="https://www.socialjukebox.com/" target="_blank" rel="noopener">https://www.socialjukebox.com/</a></p>
<h2>Industrial Academy (One Month Free Access And One Free License For Future Industrial Leader):</h2>
<p><a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-admin/wp-content/uploads/2019/10/Industrial-Academy-Graphic.png" height="538" width="1024"></a></p>
<h2>Business Beatitude the Book</h2>
<p><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-content/uploads/2019/10/BB-Book-Cover.png" height="215" width="138"></p>
<p class="ql-align-center">Do you desire a more joy-filled, deeply-enduring sense of accomplishment and success? Live your business the way you want to live with the BUSINESS BEATITUDES&#8230;The Bridge connecting sacrifice to success.&nbsp;<strong>YOU NEED THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><strong>TAP INTO YOUR INDUSTRIAL SOUL, RESERVE YOUR COPY NOW! BE BOLD. BE BRAVE. DARE GREATLY AND CHANGE THE WORLD.&nbsp;GET THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><a href="https://industrialtalk.com/business-beatitude-reserve/" target="_blank" rel="noopener"> Reserve My Copy and My 25% Discount</a></p>
<h2>PODCAST TRANSCRIPT:</h2>
<p><strong>SUMMARY KEYWORDS</strong></p>
<p>hitachi, dean, transportation, transportation system, people, optimize, airplane, talk, vehicles, industrial, mobility, solution, collaborate, connected, innovation, world, customer, company, goods, exciting</p>
<p><strong>SPEAKERS</strong></p>
<p><strong>Scott MacKenzie&nbsp;</strong>00:04</p>
<p>Welcome to the industrial talk podcast with Scott MacKenzie. Scott is a passionate industry professional dedicated to transferring cutting edge industry focused innovations and trends while highlighting the men and women who keep the world moving. So put on your hard hat, grab your work boots, and let's get right Welcome to the industrial talk podcast absolute honor that you have joined this platform that celebrates you, you industrial hero, you're bold, you're brave, you dare greatly. You solve problems, you innovate, because you're innovation issed. And you're changing lives and you're changing the world. That's why we celebrate you on this particular podcast.</p>
<p>00:42</p>
<p>You know, what?</p>
<p><strong>Scott MacKenzie&nbsp;</strong>00:43</p>
<p>industry has changed so rapidly? It's an exciting time. And if you're thinking about getting into a career into something that is exciting, yeah. Industry, is it because we are talking innovation like nobody's business? Now in the hot seat, gentlemen, that by the name of Dean bushi, he is with Hitachi America, he is the transportation mobility shmi, or subject matter expert there. And I got to tell you, if there's a topic that needs to be discussed, it is definitely that one, let's get cracking. So, so what's great about this? So what's cool is that Dean massive skills, massive skills, stack card is just dripping with skills. And he we talk about connected transportation systems. Now, you're saying to yourself, Scott, why would we want to do that? And it's everything moves by some form of transportation? And can we improve upon that? Oh, yeah. Oh, absolutely. We can, people like Dean, Hitachi America, and others, they're really exploring the innovation that is needed for that particular next generation, that ability to be able to focus on a customer 100% in their transportation, in their logistics in their supply chain solution. And it just gets down to that connected capability to be able to see exactly what's going on. It's exciting, and it can't be done. This is not pie in the sky stuff. This is not something that you're gonna say that it's just not gonna happen, we're gonna still deal with it, no, this this, whatever we call this next normal, has really created a sort of a focus on some of the challenges that take place within our transportation system and the need to be able to bring in electrification, the need to be able to think about autonomous vehicles. Just in the last mile, there are so many subjects, and and topics to discuss in this particular, you know, if you look at a transportation, supply chain, you know, logistics, it's all there and connected. Before we get into it. Just FYI, I want to be able to just sort of once again, plant your seed, the industrial talk is all about education. Got it. Dean's right here, educating, it's important, you got to stay ahead of that. You got to collaborate, you don't have Dean and company, they collaborate with a number of other companies to be able to come up with solutions that truly meet customer's needs. And then definitely innovate. The future is truly an innovation as type of platform it it really pushes the envelope, and it's an exciting time. The industrial talk platform is sort of going through a an upgrade, shall we say an industry industrial talk to Dotto, that means we want to be able to facilitate that education and get the greatest and latest information on whatever you want to talk about that innovation that's out there that will make you a better company that will make you a better professional, and to be able to collaborate with these individuals that will say, Hey, we want to do it with you. We want to be able to create and change the world by collaborating and then finally, deploy an innovation, deploying innovation that truly transforms the world. That's what industrial talk is all about. That's what the two dot o focus is going to be on. There's a lot of great stuff out there a lot of wonderful conversations to have. And I'm telling you right now, this guy right here on this side of the microphone is absolutely jacked. All right, deep transportation, mobility, subject matter expert. And I mean, we just scratched the surface in this conversation. And he's the go out to a stat guide. It's it's deemed dash bushing. That's bu sh e y. Find them reach out to him. He wants to connect. And he is an absolute wealth of knowledge. And I'm telling you, once again, we're just scratching the surface because when we start talking about connected capabilities, we're talking about utilities. We're talking about the necessity for cybersecurity. It just never stops. Alright, let's get cracking. Enjoy the conversation with Dean bushi. Dean, welcome to the industrial talk podcast. Thank you very much for finding time in your schedule to talk to the listeners. How are you doing today?</p>
<p><strong>Dean Bushey&nbsp;</strong>05:13</p>
<p>I'm doing fantastic. Thank you for having me on the show.</p>
<p><strong>Scott MacKenzie&nbsp;</strong>05:16</p>
<p>I love it. And he's with Hitachi America. He is a subject matter expert when we start talking about transportation and mobility, but I'm not going to talk about it you're going to talk about, give us a little 411 on who Dean is, and where do you come from and why you're such an incredible professional.</p>
<p><strong>Dean Bushey&nbsp;</strong>05:31</p>
<p>Sure, I've got a military background, I spent 25 years in the military as a pilot and manner leader.</p>
<p><strong>Scott MacKenzie&nbsp;</strong>05:40</p>
<p>Hola, Hola. Hola. Hola. You just can't gloss over that. I'm looking at your stat card out on LinkedIn. And I'm still trying to find pilot. And that would have been just really great to include there because I would be just all geeked out now. Now I'm geeked out now You caught me off guard because I'd rather talk about that.</p>
<p><strong>Dean Bushey&nbsp;</strong>05:58</p>
<p>Well, if you want to talk about flying airplanes, I love flying airplanes. I went to the Air Force Academy and I went down to pilot training in Arizona, I spent three different tours overseas, flew seven different airplanes, got some combat time, flew unmanned aircraft. So we did a lot of different things in the military, which prepared me for long range transportation, a lot of the time I spent was in C fives the biggest airplane we have. So we were we were talking about how to optimize the flow of goods and services and people. introduction into my own transportation, mobility. And then I got a PhD in computer science, went back to the Air Force Academy, taught back there a little bit. But then they put me out in unmanned aircraft where we were trying to have the aircraft deployed overseas, and the pilots back in Dallas, or in Las Vegas, or in Washington, wherever the pilots may be. So we were trying to optimize the flow of information back and forth. The video and the command links via satellite to airplanes that were long range a bunch of different places. So</p>
<p><strong>Scott MacKenzie&nbsp;</strong>07:07</p>
<p>I have to was there ever a delay? Like I mean, if you've got that distance, if you're, you're flying over, you know seas, and you've got your command here and in North America, that was there ever, like an information delay?</p>
<p><strong>Dean Bushey&nbsp;</strong>07:19</p>
<p>Yeah, there's three quarters of a second delay each way. So when I move this way, with the stick three quarters of a second later, the airplane will do that. But it takes three quarters of a second to come back for me to realize the airplane did that. So it's about a second and a half delay via satellite, which makes it really tough to land via satellite. That's usually why you have a local unit that captures the airplane and lands, the airplane locally.</p>
<p><strong>Scott MacKenzie&nbsp;</strong>07:49</p>
<p>That's a whole nother conversation that I would love to have. I think that's just but we can't because this is industrial talk. And we got to talk about transportation and mobility and the challenges associated with it as I push that whole other subject to the side, and I'm not very happy with that. Thank you very much, Dean, appreciate you catching me off guard with that. Sure. Anyway. A lot of conversations with a lot of professionals that have been on the on the the industrial talk podcast, talk a little bit about that, that the challenge is going forward mobility wise. In the transportation, the challenge is this whole conversation about automated vehicles and autonomous autonomous vehicles, all of that is just this big soup of interest. But how do you how do you make? Oh, how do you make sense of it? Where do you go? What do you start first, Dean?</p>
<p><strong>Dean Bushey&nbsp;</strong>08:42</p>
<p>Yeah, that's an interesting discussion. So I view transportation as going back to the old movie planes, trains, and automobiles. And it's really moving people and goods across all of those spectrums. So if you get focused just on making a car drive itself, or making a train super efficient, and on schedule, I think you're missing the boat really for, for me, it's about getting you or a package from its warehouse to its final destination. And then if that involves a lot of different modes of transportation, whether it's the delivery guy, which is last mile, whether it's putting it on a train, putting on a ship, putting it on one of my airplanes, and I'm going global, all of that comes into factor. So you as the customer and we talked about a little bit of yo care where the package started, you just want it tomorrow. Well, that's a whole transportation system. That's got to be integrated, optimized, examined, and then from a company like Hitachi, we're really into optimizing the flow of information and goods and services. That's where we can come in and make a big difference. But it's it is an information question, right? It really is.</p>
<p><strong>Scott MacKenzie&nbsp;</strong>09:58</p>
<p>I mean, I think the The The, the, the infrastructure and sure it could be optimized, but it's really a collection of data and that that ability to be able to decide on what that data means, right?</p>
<p><strong>Dean Bushey&nbsp;</strong>10:12</p>
<p>You are correct. And you would actually maybe, or maybe not be surprised that how a lot of this information does not flow smoothly. There are different API. So if I'm trying to get information from a cell phone, and an autonomous vehicle and a train, and maybe a traffic stoplight, all of those have sensors, they're all information providers. But those those if that information doesn't actually talk to each other real smoothly. So the key to make a connected transportation system, and that's really where my that's it, that's</p>
<p><strong>Scott MacKenzie&nbsp;</strong>10:43</p>
<p>the that's the term Go ahead.</p>
<p><strong>Dean Bushey&nbsp;</strong>10:45</p>
<p>That's, that's the secret sauce. So connected transportation system, making a smart, which is what you were hinting at, is getting all those various data sources to one communicate. And then when you need and then to, you need to adjust them at three, you need to make smart decisions for you. If you're the customer, I need to be able to answer questions you may have like, how do I optimize the flow of this traffic through this neighborhood? Or how do I optimize the flow of my palette from beginning to end and its journey?</p>
<p><strong>Scott MacKenzie&nbsp;</strong>11:17</p>
<p>See, this is where it seems like a huge challenge. I mean, it's massive, because if you just go out to the the Interstate, you see trucks, you know, you go to the rail yard, you see a bunch of I mean, it's just full of stuff, and we move stuff all over the world. Right. And, and in that network, there's there's inefficiencies. Where do you Where do you just sort of, from your perspective, where do you just start like, with that incremental approach? Yes, we got this. Yes, we're talking about this, but let's just start here. Greatest bang for the buck? How do you answer that? I don't know how you start? I mean, who brought up? You brought up street lamps? And I'm like, yeah, you could, you could do that, too. You know, I mean, please?</p>
<p><strong>Dean Bushey&nbsp;</strong>12:04</p>
<p>Well, I really think you need to, from a business perspective, you need to focus on a customer. So if if my customer, for instance, we have a customer in Florida, just outside of Orlando, I was there a couple weeks ago, and they've got a private community. And they're we're really interested in the smooth, seamless flow of people through their community. Well, that brings up one use case. Now we've defined this whole transportation system gets really I don't say simplified, but it gets focused on how do we integrate their micro transit, micro transportation, which is the shuttles and the scooters, and small bikes to their collective transportation, they have autonomous vehicles that are going to the community. That is their bailiwick. So I focus on that and we get into a use case problem, then we talk to you as a customer and say, What are your pain points? What are you not doing? Well, nothing talks to one another. And then we started exploring, okay, well, that's a pain point. And maybe Hitachi can help you do all of it, but most likely Hitachi will not. And we found that it's better for us to say, all right, if we can define the pain point, we can start to evolve solutions with you, we co create solutions with the customer, and then say, well, maybe we need to bring Intel them. Or maybe we need to bring Amazon Web Services with their cloud storage devices. And now we have the power of Hitachi, Intel and Amazon Web Services, jointly coming with a solution to a problem that you as a customer, once you get a solution, then we have a joint solution. That's probably from our perspective, business wise, repeatable. Now we have a solution that maybe Las Vegas will want, and Miami will want and San Francisco will want.</p>
<p><strong>Scott MacKenzie&nbsp;</strong>13:51</p>
<p>Yeah, you bring up a good point about the necessity to collaborate, I don't think and it's not a slam on on Hitachi or any other company. I think the use cases are that complex. And you end up in and and for a company to be able to say, yeah, we could do it soup to nuts, I don't think so it requires, you know, that collaborative desire and mindset. I just think it is. And that's the right way to do it.</p>
<p><strong>Dean Bushey&nbsp;</strong>14:22</p>
<p>Another one we're trying to tackle another use case, for example, examining is multimodal at a freight level. So if you think of a ship going across the ocean, it's got all these pallets on it. It's got all these cargo bins on it. It has a bill of lading. Well, when it gets to the port, there's a separate system that gets it off of the boat and puts it on a train. It needs a new bill of lading because those systems don't talk to one another. But when it gets to the trucking yard where you're trying to truck it, it's got a different bill of lading. So this multi modal, smooth flow of goods and services. requires, it sounds really simple. But it's not. You need sensors that tell you where the packages are, you need to optimize scheduling routes, you need companies that have great sensors, companies that have cloud based storage. And no one company can do that. So now we start to collaborate and come up with some solutions, Interim solutions as</p>
<p><strong>Scott MacKenzie&nbsp;</strong>15:20</p>
<p>we're moving towards an optimized solution, these the necessity to generate new bill of ladings is there a solution or a use case that says, hey, from from overseas manufacturing, all the way to destination, whatever it might be, whatever, whatever that that is there a way of being able to consolidate that, that solution that technology, the bill of lading, or just,</p>
<p><strong>Dean Bushey&nbsp;</strong>15:50</p>
<p>I love its legacy, obviously, a lot of it is has been in place. And once we start digitizing, and making everything less manual and less paperwork wise, you're going to start seeing a lot of solutions. And I really enjoy Amazon, I like working with them. They're they're coming up with solutions based on commerce. So money is driving them to optimize their solutions. They're getting supplies from all over the world. And you may or may not like, like the size and scope of their business model, but their business model is driving innovation based on money. And the flow of goods. So</p>
<p><strong>Scott MacKenzie&nbsp;</strong>16:31</p>
<p>it's, it's quite successful. And we had this conversation prior to the podcast, and I called it the Amazon effect. And it really because they focus on that commerce. And definitely the the customer because they know that the customer's impatient, I want my like, go out there. That's, that's, that's an interesting challenge. And they deliver. You know, now all of a sudden, you get the little vans out there, the Amazon vans, they're doing the last mile they're doing whatever that is. And I I mean, I can't help but like it.</p>
<p><strong>Dean Bushey&nbsp;</strong>17:12</p>
<p>And, and as much as it sounds like it's you ordered on Amazon Amazon's website, it's an Amazon product delivered by Amazon fulfillment centers to your house, you bought it from a bunch of different companies. You had a shipping company, you had to have the ports, maybe you had the government involved as far as clearing those islands that come in, you have local communities you had have roads that were able to deliver to your house, maybe you had connected communications amongst the communities. So all of that happened, even though it looked like Amazon to you all of that happened because you have collaborative systems</p>
<p><strong>Scott MacKenzie&nbsp;</strong>17:48</p>
<p>where Yeah, and and now. And now if I don't, if I don't get a notification that my drivers 10 stops away, I'm frustrated.</p>
<p><strong>Dean Bushey&nbsp;</strong>17:59</p>
<p>I'm ready to cancel my order.</p>
<p><strong>Scott MacKenzie&nbsp;</strong>18:01</p>
<p>Like, what's going on? What kind of service is this? So with that said, I mean, there's just, it sounds like there's a lot of great and wonderful opportunities to truly great bottom line value, great customer service, great. All of the stuff that that you do so desire. Where do you see it going? Because it's not going to stop? Right? It's just not nobody's going to say, All right. We tried this whole supply chain thing that we're done. We're going to go back to the old way. Where do you see going there?</p>
<p><strong>Dean Bushey&nbsp;</strong>18:37</p>
<p>Yeah, I really see a big I wouldn't I'm some people would say it's a disrupter. I'd say it's an enhancer, when you start talking about the electrification of vehicles. Ah, I'm gonna I'm gonna leave alone, airplanes and maybe electric in the future, but cars transportation systems, when when you talk about the electric infrastructure that's going to be required to support large scale fleets that become electrical. I mean, you start at the automobile, OEM manufacturers, those plants all are producing internal combustion engines. Those plants need to be modified and optimized to produce Evie vehicles. Is the battery going to be separate from the vehicle? You can have battery manufacturers and vehicle or is for get a pretty spot? Then how do you charge these vehicles? Where do you charge these vehicles? And what is the impact on the grid? Are we going to have an issue where everybody plugs in at five o'clock and all of a sudden, the energy grid gets a hit? Probably? Yeah. What are you gonna do with all the gas stations when you start earning an electric vehicle? You may you in California or New Orleans or me in North Carolina, we may be able to find a charge station. What happens to all those old gas stations they have to be converted? And then how do you get those systems to talk to one another right now nothing talks to one another. I think That's why I say it's an enhancer. It's disruptive. But when you go to electric vehicles and electric charging stations, there's a great opportunity to optimize based on the communication among those stations and communication among vehicles.</p>
<p><strong>Scott MacKenzie&nbsp;</strong>20:14</p>
<p>The and correct me if I'm wrong, the dean, the electrification of these vehicles is key for the autonomous, right. It's it sort of, it just sort of goes hand in hand. So I've got these automated vehicles out there, I might not have the resources to be able to deliver the truck. But is that is that it has to be electrification.</p>
<p><strong>Dean Bushey&nbsp;</strong>20:38</p>
<p>Correct. I spent a year with voyage on autonomous vehicle company. And they did. They had a hybrid. They had a Chrysler Pacifica, which was a hybrid vehicle. But everything about the vehicle had to be electrified, because you had a massive computer in the back, right? You had the brains were in the back of the computer, or the car that were making split second decisions based on sensors, which were all electric. So there had to be a very large electrical source of power. Wow. Yeah. Yeah, if you start making more than more than autonomous, autonomous is fun, but autonomous and then connected, where it actually could transmit and receive data via Wi Fi or LTE or 5g as it comes out. Now you're making now you get me really excited. It's where the future is here. See,</p>
<p><strong>Scott MacKenzie&nbsp;</strong>21:32</p>
<p>that's, that's right in line with your statement of connected transportation systems. That's it. It's people like you and others who who think about this, you know, night and day, which is pretty cool. Thank you for doing that. Because, but for people like me and others, it's it's a, it's a pretty cool food future. But we as consumers, yeah, we take it for granted. I take it for granted that I'm going to get my package out there, I don't see the nuts and bolts into how that sausage is made to get that package to my front store. And now now somebody takes a picture of it, it says this is where it's at. It's like, yeah, there. There it is. I mean, it just keeps going up. And it's just little things like that.</p>
<p><strong>Dean Bushey&nbsp;</strong>22:13</p>
<p>When you Yeah, well, this is almost for soccer, because you asked me how I was doing at the beginning of the podcast, and how do I like to talk to you, America, I love it. Because Beverly said, Dean, we want you to stay on top of the transportation industry, we want you to stay on top of mobility, which means that my job is to make sure I'm on the cutting edge of all the innovations. And it's it's huge and it affects every phase of life. I think it's one of the biggest enablers or disruptors, whatever you want to call it, transportation is going to affect everything. Obviously CODEL shot a lot down, and it's going to change transportation. But if we can enable people to be able to move about cities, and we enable the movement of goods and services, and we connect all of this, that's just really exciting to me, because you're making a difference in people's lives. You're not, you're not just doing something to deliver whatever you're making a difference.</p>
<p><strong>Scott MacKenzie&nbsp;</strong>23:06</p>
<p>Here's a question that I don't know if there's an answer to it. But let's say Amazon's Amazon, Amazon is going to have the capital to be able to do whatever it really wants to do and to be able to innovate the way they want to innovate, to benefit themselves, the shareholders, whatever it might be, whatever that driver is, but what about, what about the mid to small companies that price point? How do they How do they participate in this this brave new world?</p>
<p><strong>Dean Bushey&nbsp;</strong>23:35</p>
<p>I think there's lots of opportunities. I do a little teaching on the side to computer science students. And we talk about several facets on how you can get into this, whether it's the passenger experience in the vehicle, maybe you're designing a new infotainment system or a connected system where that if you're driving by a coffee shop, you get a pop up of a coupon on your phone saying, Hey, I recognize that you're virtually in front of a coffee shop. Maybe it's the Eevee design or designing batteries, and you're doing a computer design of what we would call a digital twin, a simulation. Maybe you're helping with the mobility phase of it. There's just there's just so many avenues for people to get in this game. And yes, digital companies tend to expand and they can tract and then merge very quickly. But so do computer science technicians they they they spent a year at a company and they're going to a next company and they're doing amazing thing. So it's really exciting time to be a technologist in this Evie changing world because there are so many paths and the small companies</p>
<p><strong>Scott MacKenzie&nbsp;</strong>24:49</p>
<p>is where it is the AI and yeah, no I agree with you 100% on that that's true and it's the it appears that though it's true Blue Ocean opportunity. And it's it's not even bound by your imagination you can, if you can think it, you could probably execute upon it, you might might be able to find somebody to help you work through it. That's pretty good. But you know what you just said it's sort of Minority Report ish, the movie, where, where are you driving by? It's like, hey, look at that this coffee shop has something on for sale. Hey, hey, you need a shirt. You were talking about the shirt? Here's a shirt for sale right next to you. Yeah,</p>
<p><strong>Dean Bushey&nbsp;</strong>25:31</p>
<p>it's, you know, it's you. We even haven't even touched on cybersecurity.</p>
<p><strong>Scott MacKenzie&nbsp;</strong>25:38</p>
<p>That's a whole nother thing. Transportation Systems.</p>
<p><strong>Dean Bushey&nbsp;</strong>25:42</p>
<p>Somebody's got to be smart enough. And hopefully, it's the kids that I'm teaching. They're smart enough to start developing systems that are secure, robust and reliable, and have backup systems. Because when you connect to things, there's a sort of intrusion. There could be</p>
<p><strong>Scott MacKenzie&nbsp;</strong>26:01</p>
<p>sort of intrusion. that's a that's a whole nother conversation. I like the conversation about cybersecurity, because I think that it's, it's one of those topics that nobody wants to have, but everybody has to have it.</p>
<p><strong>Dean Bushey&nbsp;</strong>26:15</p>
<p>When it's working fine. I</p>
<p><strong>Dean Bushey&nbsp;</strong>26:16</p>
<p>just don't want to know when to do</p>
<p><strong>Scott MacKenzie&nbsp;</strong>26:18</p>
<p>Right. Exactly. I don't come to me and let me hear my dirty laundry and and say that, no, it's it. That's a whole nother conversation. And yes, if you know somebody within Hitachi America that wants to talk about cybersecurity. I'm all ears. We're all headphones. We're all my</p>
<p><strong>Dean Bushey&nbsp;</strong>26:35</p>
<p>Yeah, I definitely have some</p>
<p><strong>Scott MacKenzie&nbsp;</strong>26:36</p>
<p>people that would love to talk to you because it is a great topic. And it's like you said and I think that we just there's that human element, the gravity of it is so it's it's like overwhelming. And and the same thing in the world of cyber in those same thing with the this whole digital journey. It's from me, simple mind. It's overwhelming, but it's it's exciting at the same time.</p>
<p><strong>Dean Bushey&nbsp;</strong>27:06</p>
<p>One, one particular use case that's a little bit outside of mobility. But I've tended to become a utility infield player for Beverley just whatever she needs help on I I plugged myself into. We were designing some advanced energy management systems for a town outside of Orlando. And basically it's grid, a grid load balancing, if you think about what happened in Dallas have a demand and peak demand cycles. So connecting buildings, what are the the energy source, the grid sources traditional grid, or its solar or floating voltaic cells, or whatever, you want to put Eb charging stations, connecting buildings and parking garages so that they manage the load much better? Building says, hey, I've got a real high load and the feeder from the Orlando utility company says, hey, that's a pretty high spike. Some of the other buildings can come in and go Okay, well, we have excess capacity. Yeah. Well, so that introduced a connected system, we immediately had to go to our cybersecurity people and say, all right, we need to have you part of this project to say, Hey, there could be intrusion since we're communicating wires.</p>
<p><strong>Scott MacKenzie&nbsp;</strong>28:20</p>
<p>I love it. It's exciting. And it just seems like the the speed at which all of this is happening is is lightning. It because you guys just sort of sit around, I don't know, hang around the water cooler. And you know, chirp about how we can digitally transform everything in the world.</p>
<p><strong>Dean Bushey&nbsp;</strong>28:40</p>
<p>I really wish I was 20 years old to get it because I think the next 20 years is going to be amazing.</p>
<p><strong>Scott MacKenzie&nbsp;</strong>28:46</p>
<p>That's exciting. Well, let's put it this way. We're gonna have to wrap it up. However, how do how does somebody get ahold of the dean</p>
<p><strong>Dean Bushey&nbsp;</strong>28:54</p>
<p>told me at Hitachi, so I will provide you a my email address. It's not pushy.hs. Guy calm. I'm out on the web. I've got several different places where you can see my writings on Hitachi data, LinkedIn, you can find me on LinkedIn, but usually great way to get a hold of me.</p>
<p><strong>Scott MacKenzie&nbsp;</strong>29:16</p>
<p>Which is pretty cool. Because you've got Dean dash bushing, which is very, you were an early adopter to LinkedIn and must be because because I'm sure there's other Dean Bushey.</p>
<p><strong>Scott MacKenzie&nbsp;</strong>29:27</p>
<p>I live in the digital world.</p>
<p><strong>Scott MacKenzie&nbsp;</strong>29:30</p>
<p>It's it's dead sexy. I'm telling you. It is and I, I geek out. I'll be the first to do that. But Thank you, Dean for finding time in your busy schedule. And, and sharing with us a slew of information and insights. I'm overwhelmed. Now. You're a disrupter. That's what you are doing. Alright, thank you, Scott. Appreciate it. All right. Thank you listeners. Hey, hey, we're gonna be wrapping up on the other side. All of the contact information for Dean will be available And really appreciate you joining the industrial talk podcast where we celebrate you industry professionals. Stay tuned. You're listening to the industrial talk Podcast Network.</p>
<p><strong>Scott MacKenzie&nbsp;</strong>30:16</p>
<p>All right, a big, big kudos to Dean Bushey. That's b u s h e y madstad card out there on LinkedIn, told you the information in the content would be just absolutely to die for. Man, I'm telling you. I'm just taking the innovation. And where's it going?</p>
<p><strong>Scott MacKenzie&nbsp;</strong>30:35</p>
<p>What does it look like? What</p>
<p><strong>Scott MacKenzie&nbsp;</strong>30:36</p>
<p>did we can look like in 10 years? Not a clue. Like guarantee it's going to be different. And it's because of people like Dean Petacci, America and others, pushing the envelope, wanting to collaborate. Definitely want to innovate. All there. All right, reminder. It does real talk to Dotto and that is where you're going to go. That's where you're going to go to educate. That's where you're going to go to collaborate. And that's where you're going to go to innovate. And you're going to find people like Dean bushi out there, and you're going to reach out to that guy, because you need to because he sees the future and others on the industrial talk podcast. Absolutely true. So do not hesitate. Go out to industrial talk.com find out more. All right, be bold, be brave, dare greatly hang out with people that are bold, brave and daring greatly and you will change the world. We will be back with another great interview shortly.</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/dean-bushey-with-hitachi-america-talks-about-the-connected-transportation-system/">Mr. Dean Bushey with Hitachi America Talks about The Connected Transportation System</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://industrialtalk.com/episodes/dean-bushey-with-hitachi-america-talks-about-the-connected-transportation-system/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://podcasts.captivate.fm/media/0623f76d-3b33-4b50-a27e-89156d670e75/dean-bushey-interview.mp3" length="36341607" type="audio/mpeg" />

			</item>
		<item>
		<title>Mr. Vincent Scott with Defense Cybersecurity Group is talking Cybersecurity in a Industrial 4.0 World</title>
		<link>https://industrialtalk.com/episodes/vincent-scott-with-defense-cybersecurity-group-is-talking-cybersecurity-in-a-industrial-40-world/</link>
					<comments>https://industrialtalk.com/episodes/vincent-scott-with-defense-cybersecurity-group-is-talking-cybersecurity-in-a-industrial-40-world/#respond</comments>
		
		<dc:creator><![CDATA[Scott MacKenzie]]></dc:creator>
		<pubDate>Mon, 01 Feb 2021 15:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://industrialtalk.com/captivate-podcast/vincent-scott-with-defense-cybersecurity-group-is-talking-cybersecurity-in-a-industrial-40-world/</guid>

					<description><![CDATA[<p>In this week's Industrial Talk Podcast we're talking to Vincent Scott, founder and CEO at Defense Cybersecurity Group about "Having you Cybersecurity act together in an Industry 4.0 World".  Get the answers to your "Cybersecurity" questions along with Vince's unique insight on the “How” on this Industrial Talk interview!</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/vincent-scott-with-defense-cybersecurity-group-is-talking-cybersecurity-in-a-industrial-40-world/">Mr. Vincent Scott with Defense Cybersecurity Group is talking Cybersecurity in a Industrial 4.0 World</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="cfm-player-iframe" style="width: 100%; height: 170px; margin-bottom: 20px; border-radius: 10px; overflow:hidden; border: 1px solid #d6d6d6;"><iframe style="width: 100%; height: 170px;" frameborder="no" scrolling="no" seamless allow="autoplay" src="https://player.captivate.fm/9cfc9ace-71ad-48a0-b0c3-176c587e6961"></iframe></div><p></p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/vincent-scott-with-defense-cybersecurity-group-is-talking-cybersecurity-in-a-industrial-40-world/">Mr. Vincent Scott with Defense Cybersecurity Group is talking Cybersecurity in a Industrial 4.0 World</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://industrialtalk.com/episodes/vincent-scott-with-defense-cybersecurity-group-is-talking-cybersecurity-in-a-industrial-40-world/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://podcasts.captivate.fm/media/02c49c72-e9e9-44db-9e1a-0d612dd884ad/vincent-scott-interview.mp3" length="42878843" type="audio/mpeg" />

			</item>
		<item>
		<title>Ms. Sandy Carielli with Forrester Research is talking about BOTs and Possible Impact to Business.</title>
		<link>https://industrialtalk.com/episodes/sandy-carielli-with-forrester-research-is-talking-about-bots-and-possible-impact-to-business/</link>
					<comments>https://industrialtalk.com/episodes/sandy-carielli-with-forrester-research-is-talking-about-bots-and-possible-impact-to-business/#respond</comments>
		
		<dc:creator><![CDATA[Scott MacKenzie]]></dc:creator>
		<pubDate>Wed, 06 Jan 2021 15:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://industrialtalk.com/captivate-podcast/sandy-carielli-with-forrester-research-is-talking-about-bots-and-possible-impact-to-business/</guid>

					<description><![CDATA[<p>In this week's Industrial Talk Podcast we're talking to Sandy Carielli, Principal Analyst at Forrester Research about "What You Need to Know About BOTs and Possible Impact to Your Business".  Get the answers to your "Web Scraping" questions along with Sandy's unique insight on the “How” on this Industrial Talk interview!</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/sandy-carielli-with-forrester-research-is-talking-about-bots-and-possible-impact-to-business/">Ms. Sandy Carielli with Forrester Research is talking about BOTs and Possible Impact to Business.</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="cfm-player-iframe" style="width: 100%; height: 170px; margin-bottom: 20px; border-radius: 10px; overflow:hidden; border: 1px solid #d6d6d6;"><iframe style="width: 100%; height: 170px;" frameborder="no" scrolling="no" seamless allow="autoplay" src="https://player.captivate.fm/936286cc-0846-4c1a-a477-513eb07197cc"></iframe></div><p></p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/sandy-carielli-with-forrester-research-is-talking-about-bots-and-possible-impact-to-business/">Ms. Sandy Carielli with Forrester Research is talking about BOTs and Possible Impact to Business.</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://industrialtalk.com/episodes/sandy-carielli-with-forrester-research-is-talking-about-bots-and-possible-impact-to-business/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://podcasts.captivate.fm/media/2bdcd7d7-723d-4094-bc0e-3d976ca0e2ff/sandy-carielli-interview-2.mp3" length="44792293" type="audio/mpeg" />

			</item>
		<item>
		<title>Mr. Gary Chan with Alfizo talks about How Cybersecurity has changed because of COVID19</title>
		<link>https://industrialtalk.com/episodes/gary-chan-with-alfizo-talks-about-how-cybersecurity-has-changed-because-of-covid19/</link>
					<comments>https://industrialtalk.com/episodes/gary-chan-with-alfizo-talks-about-how-cybersecurity-has-changed-because-of-covid19/#respond</comments>
		
		<dc:creator><![CDATA[Scott MacKenzie]]></dc:creator>
		<pubDate>Mon, 07 Dec 2020 15:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://industrialtalk.com/captivate-podcast/gary-chan-with-alfizo-talks-about-how-cybersecurity-has-changed-because-of-covid19/</guid>

					<description><![CDATA[<p>In this week's Industrial Talk Podcast, we're talking to Gary Chan, Founder and Information Security Consultant at Alfizo about "How Cybersecurity has changed because of COVID-19".  Get the answers to your "Cybersecurity" questions along with Gray's unique insight on the “How” on this Industrial Talk interview!</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/gary-chan-with-alfizo-talks-about-how-cybersecurity-has-changed-because-of-covid19/">Mr. Gary Chan with Alfizo talks about How Cybersecurity has changed because of COVID19</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="cfm-player-iframe" style="width: 100%; height: 170px; margin-bottom: 20px; border-radius: 10px; overflow:hidden; border: 1px solid #d6d6d6;"><iframe style="width: 100%; height: 170px;" frameborder="no" scrolling="no" seamless allow="autoplay" src="https://player.captivate.fm/ed9eaeae-f7b2-4ea7-8cfa-4787ba577ee8"></iframe></div><p></p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/gary-chan-with-alfizo-talks-about-how-cybersecurity-has-changed-because-of-covid19/">Mr. Gary Chan with Alfizo talks about How Cybersecurity has changed because of COVID19</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://industrialtalk.com/episodes/gary-chan-with-alfizo-talks-about-how-cybersecurity-has-changed-because-of-covid19/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://podcasts.captivate.fm/media/93a9ce2f-c8c1-4503-a6a3-5647f6748862/gary-chan-interview.mp3" length="37704705" type="audio/mpeg" />

			</item>
		<item>
		<title>Mr. Steve Griffith with NEMA talks about Industrial AI and Cybersecurity for Future Success</title>
		<link>https://industrialtalk.com/episodes/steve-griffith-with-nema-talks-about-industrial-ai-and-cybersecurity-for-future-success/</link>
					<comments>https://industrialtalk.com/episodes/steve-griffith-with-nema-talks-about-industrial-ai-and-cybersecurity-for-future-success/#respond</comments>
		
		<dc:creator><![CDATA[Scott MacKenzie]]></dc:creator>
		<pubDate>Wed, 28 Oct 2020 15:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://industrialtalk.com/?post_type=captivate_podcast&#038;p=7091</guid>

					<description><![CDATA[<p>In this week's Industrial Talk Podcast and in conjunction with The Industrial IoT World, we're talking to Steve Griffith, Industry Director, Transportation Systems and Cybersecurity at NEMA about "What you need to know about Industrial AI and Cybersecurity for future success".  Get the answers to your "AI and Cyber" questions along with Steve's unique insight on the “How” on this Industrial Talk interview!</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/steve-griffith-with-nema-talks-about-industrial-ai-and-cybersecurity-for-future-success/">Mr. Steve Griffith with NEMA talks about Industrial AI and Cybersecurity for Future Success</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="cfm-player-iframe" style="width: 100%; height: 170px; margin-bottom: 20px; border-radius: 10px; overflow:hidden; border: 1px solid #d6d6d6;"><iframe style="width: 100%; height: 170px;" frameborder="no" scrolling="no" seamless allow="autoplay" src="https://player.captivate.fm/104bc766-2bfa-44fc-8fcc-7854067023bf"></iframe></div><p>In this week's&nbsp;<strong><em>Industrial Talk Podcast</em></strong> and in conjunction with <strong><em>The Industrial IoT World</em></strong>, we're talking to <strong>Steve Griffith, </strong>Industry Director, Transportation Systems and Cybersecurity at NEMA about <strong>&#8220;What you need to know about Industrial AI and Cybersecurity for future success&#8221;</strong>.&nbsp;Get the answers to your &#8220;AI and Cyber&#8221; questions along with Steve's unique insight on the “How” on this Industrial Talk interview!</p>
<p>Also&#8230;..&nbsp;Take ownership of the new normal at <strong>Industrial IoT World Virtual 2020</strong> to ensure you don't get left behind.&nbsp;Join industry-wide discussions addressing core IIoT challenges from monetizing and securing data to updating legacy infrastructure and outdated business models.&nbsp;This year's speakers include leaders from Boeing, Johnson & Johnson, Michelin, ExxonMobil, Nestle and more sharing their insights on Industry 4.0, Privacy & Security, IT/OT Integration, Edge Computing and Protective Maintenance/AI.&nbsp;Find out more about this wonderful event by clicking here:&nbsp;<a href="https://tmt.knect365.com/industrial-iot-world/virtual-event-pass-breakdown/?utm_campaign=TEC6626-industrial-iot-world&utm_content=website-listing&utm_medium=media-partner&utm_source=industrial-talk&mc=industrial_talk" target="_blank" rel="noopener"><strong>START YOUR IIoT JOURNEY HERE!</strong></a></p>
<p>You can find out more about <strong>Steve and the wonderful team at NEMA </strong>by the links below. Finally, get your exclusive free access to the <a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener">Industrial Academy</a>&nbsp;and a series on “<a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener"><strong>Why You Need To Podcast</strong></a>” for Greater Success in 2020. All links designed for keeping you current in this rapidly changing Industrial Market. Learn! Grow! Enjoy!</p>
<h2>STEVE'S CONTACT INFORMATION:</h2>
<p><strong>Personal LinkedIn:</strong> <a href="https://www.linkedin.com/in/steve-griffith-pmp-0175351b/" target="_blank" rel="noopener">https://www.linkedin.com/in/steve-griffith-pmp-0175351b/</a></p>
<p><strong>Company LinkedIn:</strong> <a href="https://www.linkedin.com/company/nema/" target="_blank" rel="noopener">https://www.linkedin.com/company/nema/</a></p>
<p><strong>Company Website:&nbsp;</strong><a href="https://www.nema.org/" target="_blank" rel="noopener">https://www.nema.org/</a></p>
<h2>PODCAST VIDEO:</h2>
<p><iframe loading="lazy" title="Mr. Steve Griffith with NEMA talks about Industrial AI and Cybersecurity for Future Success" width="500" height="281" src="https://www.youtube.com/embed/C4cFrqdy9Gg?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<h2>THE STRATEGIC REASON &#8220;WHY YOU NEED TO PODCAST&#8221;:</h2>
<p><a href="https://industrialtalk.com/why-you-need-to-podcast/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-content/uploads/2020/02/Why-you-need-to-Podcast-Graphic-2.png" height="538" width="1024"></a></p>
<h2>OTHER GREAT INDUSTRIAL RESOURCES:</h2>
<p><strong>CAP Logistics:</strong>&nbsp;<a href="https://www.caplogistics.com/" target="_blank" rel="noopener">https://www.caplogistics.com/</a></p>
<p><strong>Hitachi Vantara:</strong> <a href="https://www.hitachivantara.com/en-us/home.html" target="_blank" rel="noopener">https://www.hitachivantara.com/en-us/home.html</a></p>
<p><strong>Industrial Marketing Solutions:</strong>&nbsp;&nbsp;<a href="https://industrialtalk.com/industrial-marketing/" target="_blank" rel="noopener">https://industrialtalk.com/industrial-marketing/</a></p>
<p><strong>Industrial Academy:</strong>&nbsp;<a href="https://industrialtalk.com/industrial-academy/" target="_blank" rel="noopener">https://industrialtalk.com/industrial-academy/</a></p>
<p><strong>Industrial Dojo:</strong>&nbsp;<a href="https://industrialtalk.com/industrial_dojo/" target="_blank" rel="noopener">https://industrialtalk.com/industrial_dojo/</a></p>
<p><strong>Safety With Purpose Podcast:</strong>&nbsp;<a href="https://safetywithpurpose.com/" target="_blank" rel="noopener">https://safetywithpurpose.com/</a></p>
<h2>YOUR INDUSTRIAL DIGITAL TOOLBOX:</h2>
<p><strong>LifterLMS:</strong> Get One Month Free for $1 – <a href="https://lifterlms.com/" target="_blank" rel="noopener">https://lifterlms.com/</a></p>
<p><strong>Active Campaign:</strong>&nbsp;<a href="https://www.activecampaign.com/?_r=H855VEPU" target="_blank" rel="noopener">Active Campaign Link</a></p>
<p><strong>Social Jukebox:</strong>&nbsp;<a href="https://www.socialjukebox.com/" target="_blank" rel="noopener">https://www.socialjukebox.com/</a></p>
<h2>Industrial Academy (One Month Free Access And One Free License For Future Industrial Leader):</h2>
<p><a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-admin/wp-content/uploads/2019/10/Industrial-Academy-Graphic.png" height="538" width="1024"></a></p>
<h2>Business Beatitude the Book</h2>
<p><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-content/uploads/2019/10/BB-Book-Cover.png" height="215" width="138"></p>
<p class="ql-align-center">Do you desire a more joy-filled, deeply-enduring sense of accomplishment and success? Live your business the way you want to live with the BUSINESS BEATITUDES&#8230;The Bridge connecting sacrifice to success.&nbsp;<strong>YOU NEED THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><strong>TAP INTO YOUR INDUSTRIAL SOUL, RESERVE YOUR COPY NOW! BE BOLD. BE BRAVE. DARE GREATLY AND CHANGE THE WORLD.&nbsp;GET THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><a href="https://industrialtalk.com/business-beatitude-reserve/" target="_blank" rel="noopener"> Reserve My Copy and My 25% Discount</a></p>
<h2>PODCAST TRANSCRIPT:</h2>
<p><strong>SUMMARY KEYWORDS</strong></p>
<p>NEMA, industry, steve, industrial, ai, members, data, manufacturing, cybersecurity, emerging, organizations, products, manufacturer, people, year, cyber, innovation, industrial iot, NEMA, solution</p>
<p>00:04</p>
<p>Welcome to the industrial talk podcast with Scott MacKenzie. Scott is a passionate industry professional dedicated to transferring cutting edge industry focused innovations and trends while highlighting the men and women who and keep the world moving. So put on your hard hat, grab your work boots, and let's go. Alright, welcome to the industrial talk podcast. That's right, this podcast celebrates you. You are bold, you are brave, you dare greatly. you innovate. Boy, you innovate, and you're changing lives and you're changing the world. That's why you are an industrial hero. You're a hero to me, you're making my life absolutely spectacular. And what's happening out there in industry is nothing less than spectacular. That's why this podcast is here. That's why we celebrate you each and every day. That's right. All right. You're in the hot seat. His name is Steve Griffith. That's g ri FF i th and he is with NEMA. That's an E Ma, but that's for National Electrical Manufacturers Association. It's a mouthful. That's why they went down to NEMA. Let's get cracking on this interview. It's good thing it's NEMA. I get tired just constantly saying National Electrical Manufacturers Association. Although superduper important. You need organizations like this. And especially and especially in a world that is just innovation, innovation, innovation and moving at a just an absolutely blistering pace, to be able to provide solutions for your business to make you resilient and successful in the future. NEMA, that's why they're there. Because you can't keep up with it. I mean, we had this conversation. I mean, if I put my business hat on, I can't keep up with the the level of innovation, the level of of just sheer brilliance that exists out there in manufacturing, that exist in industry, and that exists across the spectrum of how people and companies are leveraging technology to be resilient, and especially after COVID-19 you need it. So we talked about again, we talked about collaboration, innovation, and education. And that's what this podcast is all about. We want to collaborate with people that have answers we want to educate with, with things that are changing constantly, all the time and boy, innovation, we want to hear about innovation, hear about solutions, not just from a technology point of view. But from the point of view of how are we dealing with people now? How are we how are we creating those connections, you got to be innovative, you've got to be innovative. Alright, listen to me lecture, holy cow. I don't feel comfortable with that. But I am so</p>
<p>03:06</p>
<p>excited and pleased to be able to call this family, my family, right because I get to interact with individuals like Steve, organizations like NEMA, and events that are going to be taking place that you got to put on your Doug gun calendar that are just out there so that you can continue to educate. And now is a VA time. Speaking of that, paper and pencil time, get your calendar out, you got to get your calendar out. And I'm talking about industrial i o t world. And this is an event called CS iio t now for lasting digital transformation. It is a free virtual conference. And I want to tell you it is December 1. She's How about that December 1 through the third this year, put it on your calendar. And I'll have that link out there and industrial talk.com. So you don't have to worry about it. Just go to industrial talk comm find Steve's interview. And you'll get all that information. Once again. cs iiot. Now for lasting digital transform you need you need these companies. You need these organizations. You need companies like NEMA to be able to sort of help navigate these waters, these IoT waters these industrial four dot o waters, because the water I mean that it's it's changing can constantly the currents are always shifting, and you just need to stay current. And that's why the industrial IoT world and NEMA and people like Steve are just vital to your desire to collaborate, innovate and educate So that you can act with a sense of purpose and tenacity, you need to do that. Alright, let's shift to Steve stat cart. So you go out there, and I want you to type in Steve Griffith, that's g r i f,f,i t h put a little comma PMP, because he is a professional manager of projects. I think that's what PMP stands for. Anyway, that's what he is, typing in, you'll see him, you'll see that he's with NEMA, reach out to him, become his buddy on LinkedIn, you will not be disappointed because his stack guard is spectacular. He is the director of transportation system and cybersecurity and what we're going to be talking about, and I'm just telling you, there are many topics within industry for Dotto. One is of course, cybersecurity. But two is AI. How do you leverage AI? Where do we stand with AI? You know, I mean, people talk about AI. Is it in commercial operations? Or is it still just sort of at a bench level, you know, sort of proof of concept type of stuff? Where does it stand? That's why organizations like NEMA. And people like Steve are so important. You gotta because it's, it's not going away, right? So you got to line yourself, figure out who to connect with so that you get real answers with real solutions to solve real problems. Right. That's what we want to be able to do. Steve Naima. And of course, that incredible conference, again, that is scheduled for December 1 through the third. See, see how it rolled into that. That's right. It's all out there on industrial talk.com. I can't, the URL is just superduper long. So I'm not going to be able to say that so just go out to industrial talk.com find it ASAP. How's that? All right. onto the the interview. We're talking AI talking cybersecurity. We're talking about how that leaves together. We're talking industry for Dotto, Steve Griffith. The company has NEMA and I enjoyed the conversation. It's always wonderful. So enjoy the conversation with Steve. Steve, welcome to the industrial talk podcast, absolute honor that you have joined. This platform is dedicated to you. Yes, you and the rest of the industrial and manufacturing professionals all around the world. How you doing my friend?</p>
<p>07:24</p>
<p>Great. I appreciate the opportunity to be here. Looking forward to the chat.</p>
<p>07:28</p>
<p>I'm telling you, man, I'm enjoying the heck out of it. I'm living the dream, Steve, I get to talk to one people like you. And I get to have a Master's class in all things, let's say industry for Dotto or anything, it doesn't matter. And I just sit there and I soak it up. I'm a sponge. I'm pretty smart now because of this podcast. Now I'm not I'm still the dumbest, dumbest knife in the drawer. That's for doggone. Sure. Okay. For the listener, Steve, we do this all the time on the podcast, you gotta lay that foundation give us a little 411 on who Steve is?</p>
<p>08:01</p>
<p>Yes. Steve Griffith. I'm an industry director for the National Electrical Manufacturers Association, otherwise known as NEMA in acronyms speak in industry directors, kind of like a program manager strategic planning. Basically, NEMA is an association of about 325 equipment manufacturers that get together, you know, we have three or four core things we do. One of those is developing NEMA standards to address a performance issue in the market. We do government work lobbying for against regulations, we do market data and intelligence, then we look at a lot of emerging technologies and NEMA. So my job as an EMA is to kind of, you know, see where the industry is going, you know, look at all these emerging technologies and trends and and kind of bring it back to our members and see how we how NEMA moves with where the industry is going. Right? So there are a number of emergent things I lead at deema. And it's just making sure that our members are involved and</p>
<p>09:02</p>
<p>need them. It's it's interesting to me because if I had a nickel every time somebody talked to me about emerging tech innovation, or whatever industry for Dido, I'd be a wealthy man because it's happening so fast. And I would imagine organizations like NEMA. This is a great niche for this particular organization because me you know, Joe sixpack here, there's no way that I could keep up with all the changes that are taking place within manufacturing within industry. And and it's great stuff but I can't keep up with it. That's that's probably the best role for for NEMA among others.</p>
<p>09:39</p>
<p>Oh, great. Yeah, it's it's, it's, it's, it's it's pretty neat stuff. You know. I mean, the the Internet of Things and industrial IoT is happening, you know, more and more devices. Like there's a huge growth for this. And you know, a lot of our members that make manufacture these products are now developing products in the systems that are increasingly IoT enabled, right? Whether you're, whether it's manufacturing industrial, whether it's commercial and residential building, whether you're dealing with utility products, transportation, medical imaging, the IoT industrial, it spans across all our members. Right? And it's, it's, you know, it's something we're moving into, and, you know, it's I mean,</p>
<p>10:24</p>
<p>let's just, let's just sort of, you know, it's not gonna, it's not knocking on the door, It's here, it's here to stay. It's, it's putting their feet up on your coffee table. And if you're not engaged in trying to understand this whole, and I'll just sort of generally categorize it as industry for Dotto, if you're not, if I'm in manufacturing, if I'm an industry, if I'm something, I have to actively be engaged and leverage organizations like NEMA in a big way, because it's here, whether you like it or not. If you think business, as usual, is business as usual, and you're just going to merrily go about your business and think that you're going to succeed. You know, think another wise, because it's not going to be that way.</p>
<p>11:09</p>
<p>not totally great. I met Sarah. And the idea is we need to be there as well, but our members, right, as we're getting to, as well, as this space becomes prevalent, how does NEMA and our members get into this space? Right? And there's, there's there's a lot of challenges out there with with it with the industrial t in the chief of Chief number one is our members and manufacturers devices, all this data, and all this diverse data from all these devices that, you know, create data, how do you turn that into information that you can use? Right? And another another issue? that's and that's data tsunami,</p>
<p>11:42</p>
<p>I mean, exactly. Sure. We can collect that data, all the little squiggly lines, all the little zeros and ones and numbers and all that stuff. But the real value the real, you know, meat, the gold, or platinum, if you want to maybe diamonds, but in that data is the fact that I can find things in a very efficient way to be able to make tactical decisions to better my asset, that's for sure. Absolutely. Right. Yeah, I gotta jump in, because it is a tsunami.</p>
<p>12:12</p>
<p>Yeah. And then you have to deal with, you know, all that data, there's, there's privacy, there's viability, there's cybersecurity, you know, you there's all this stuff, and it's determining how you can take this data to derive meaningful outcomes, you know, predictive analytics, you know, maintenance, when you're going to products out there, you know, or improvements in a product, getting that full visibility across your product line, with all this with it with all this plethora of data and making it useful. Right. And I think that's something that we're addressing across the mind. There's there's different I think there's different trends out there different techniques, different technologies that could help our members, you know, get on top of that data.</p>
<p>12:53</p>
<p>And I'm seeing here, here's, here's the question I have for you. I'm putting on my manufacturing my industry hat. I don't know I'm putting it on. It's right there. Right on. And one of the challenges is that the speed at which the innovation, the speed at which the technology is moving, versus my ability to be able to consume it, that's one to the issue with me, saying, I think I see the value in that innovation. But where do I start? I mean, you're moving, you know, you're, you're driving at 80 miles per hour, I'm, I'm still sort of riding my bicycle. And I can't keep up with you. How do you address that?</p>
<p>13:35</p>
<p>Yeah, where to start? How do you capture all this data? And I think, yeah, how do you make it? How do you make it useful? And I think one of the new things we're looking at an EMA is artificial intelligence. That's a key, a key aspect of how, you know, with the manufacturing device that generates all this data, AI can help manufacturers derive actionable information, whether it's in the manufacturing industry, to, you know, improving the production and distribution of the manufactured goods, looking at it in the pen, maybe the back office of a manufacturing, working with, you know, distribution channels and partners to to improve aspects of product design, maintenance, and then Lifecycle Management. I think AI is one of those emerging, well, maybe it's not really merged anymore. It's one of those technology it's happening. And it's being adopted in manufacturing. And that's, that's, that's a technique that manufacturers can use to do to take this data and derive meaningful information right to better help their</p>
<p>14:42</p>
<p>manufacturing. This is interesting, because for me, I, it was interesting, here's a story, quick little story I worked for, with a company when I was consulting and I created a solution that pulled data that determine sort of that Health of that asset by the data parameters, all of that good stuff. But it was like a CAPX project, right? You had to dig a ditch, you had to do certain. And I could do it on one asset, right. But now all of a sudden, these devices, they're cost effective. And for me, as a business person, I'm thinking to myself, yeah, I'll take a box of those, and I'll stick it out here, and I'll do this and it got into five G, get back, I could do that. And it's like, all of a sudden, the floodgates open, and I'm able to track data. But then I never take the next step forward. And I'd say, Where do I put it in? How do I do? But I can incrementally me, I can incrementally approach this, because I highly recommend that by the way. There it's happening, and get some wins under your belt. And I don't know how you keep I don't know how NEMA you, your team. Hold on to that Tiger's tail. Because you guys are so innovative. Your your industry, the people you interact with are just like, we could do that too. We can do that too. And and you know, normal blokes like me, I'm just like, Oh, God, I just sat on this asset, you know? How do you do that? How do you how do you keep? How do you prioritize that name of these these? I mean, industry for Dotto AI, you know all the things it five g five g all of a sudden like me now?</p>
<p>16:33</p>
<p>Yes, good question. actually a very good question. So there's all these, there's all these emerging, we come strategic initiatives. And because NEMA is a member kind of driven organization, our members actually have a say, you know, we actually year to year, we have these, you know, these these emerging topics that we that we run across NEMA. And you know, we have a vetting process where, you know, we take any idea, no ideas, a bad idea, and then we kind of, you know, we deal with. And then we have like, emerging opportunities for when we get our members together, and we discuss the ideas, we kind of try to prioritize them, we kind of get a you know, okay, we'll kind of do a poll around the room, you know, what are your thoughts on this idea? What are your thoughts on AI, this is a good idea, we should pursue. And we have a, we have a board of governors, and even that kind of is our governing body, it consists of about 30 or so CEOs across organization, they meet four times a year. So they kind of year to year, they take the input from, you know, all the ideas from our members, all the ideas, and they've kind of coalesces and prioritizes, and actually vote on these, these, these, these, these, these initiatives, in the July timeframe. So we actually, you know, when our board met in July, they voted on, you know, what are the emerging things we want to do next year? Right, so we're already knee deep into 2020. Yeah, activities, but then we're already planning ahead for 2021 and AI, at just to kind of, is something that it's going to be carried across year to year, because there's a lot of work we're doing with AI this year, you know, we were working to look at, you know, what are all the use cases for AI, you know, you know, what, what are the places where AI is proof of concept, versus actual, you know, commercial deployments? What are the, you know, what is the implementation guidance, you know, because NEMA is a, you know, a standards organization, what are the standards gaps, what are the are the standards that you need to develop our, their testing standards. So, we're getting all that information in this in this in a research paper this year, to kind of feed into what we do next year, right, you know, whether we set up working groups to look at these, look at this in greater detail, whether we, you know, work with research institutions, you know, join government groups, put out thought pieces on AI developed standards, or like a form, you know, a form of form a more permanent group to to tackle AI and NEMA. So these, these kind of emerging topics, that they start in this kind of program, but the idea is because, you know, they kind of continue to become a more permanent home and NEMA. And to give you an example of, of something that we did in the past, I'm shifting gears,</p>
<p>19:20</p>
<p>cyber security, baby,</p>
<p>19:22</p>
<p>cyber security started off for about four or five years in the same process, because, you know, when you're dealing with, you know, the Internet of Things, our members, you know, they get it, they understand that they have a role when they when they build these products to make them as, as secure as possible. And, you know, when these products are deployed, how do you make sure that they there's no bad actors that are malware that can then affect things after they're developed? So our cybersecurity activities, you know, started as a as one of these same kind of Strategic Initiatives about three or four years ago. Now it's a permanent activity with NEMA right because cyber is clearly not going away. Right? I mean, I mean, you get with the IoT my lifetime. Yeah. And, you know, and and so the stuff that we're doing is, you know, there's tons of standards out there with cybersecurity. We're trying to do practical guidance, right? You know, what, what can a manufacturer do in their supply chain to look at malware in the embedded components are tamper proofing, cyber hygiene is it's a topic when when a manufacturer, you know, delivers a product to their customer, whether it's a, you know, it's a hospital or utility or a building, how do you work with that, that customer that end user to mitigate cybersecurity risks by following industry guidelines, because cybersecurity is it is the responsibility that's shared between the manufacturer and the end user. So cyber started as a strategic initiative. But now it's a core activity, because it's not going away. So I envision</p>
<p>20:53</p>
<p>that will always fascinates me because it's never going away. And you have just come in, and you're just like, well, I've got to have some sort of plan of attack, to keep, keep my assets protected, my business protected, and that's ongoing. And that's once again, I would imagine that's a relationship between me business solution, manufacturing provider, and the the manufacturer of that,</p>
<p>21:19</p>
<p>that device,</p>
<p>21:21</p>
<p>right, because they're gonna have to keep up with it, they're gonna have to invest time, energy, effort and money into, you know, identifying those malicious, bad actors out there. Yeah. I don't I you know, I just don't I keep, but it gives me a lot of great feel, feel in my heart that companies and organizations like me, but you and your team and so on your part passionate about it, you keep up with it, because then for me, and then you prioritize it. So it makes my thought process a bit easier. And so I don't have to sit there and try to think through it myself. I like that a lot. I think that's now what industries are you specifically focusing in on Steve? What like, what what are you focused in on with these solutions?</p>
<p>22:17</p>
<p>Um, so the, you know, obviously, AI and cyber cuts across all all NEMA, right, whether it's, you know, manufacturing, you know, industrial products, automation, you know, commercial and residential buildings, all the building systems of fire and life safety, you know, medical imaging group, we have a, we have a group that does huge X ray machines in hospitals, right? utility products, right, the products that you know, switch gears, transformers, right, things that that are that are integral components to electric grid, transportation, which is the group I lead is all, you know, for example, you know, the the traffic signaling devices that connected intersections, right, you know, things that can't go down, right, that are, that are critical infrastructure, or electric vehicle, equipment, charging equipment, right. So, that's my focus. But you know, the activities that I do really cut across the entire Association, right, and I have colleagues that kind of lead the other divisions, but the idea is that the work projects that I do, like AI or cybersecurity are tailored across</p>
<p>23:19</p>
<p>our members. gonna sit there and go, Hey, I have the secret sauce over here, the world and I'm not going to tell my colleagues about the fact that I've got the secret sauce, that's not going to happen, of course, it's going to go across. The only thing I can think of when you start talking about traffic lights, of course, everybody's seen movies where somebody in the computer chain, I'm gonna create chaos, and I'm gonna just hack into these, these traffic lights and and make them all green. Right?</p>
<p>23:44</p>
<p>Yeah. Now we've actually we actually developed in my transportation, but we actually developed a cybersecurity standard for it for intelligent transportation systems that addresses some of that low hanging fruit, you know, hacking into, for example, you know, traffic controller can, it's all the same keys, making sure those keys are unique, right? Using secure communication protocols, right? So cyber is a pretty big issue across me.</p>
<p>24:08</p>
<p>And you know what the problem is with you with cyber people. Nobody wants to talk about it. Right? Nobody wants to say,</p>
<p>24:15</p>
<p>Hey,</p>
<p>24:16</p>
<p>I just had a breach over here. And it's not good. But you know what I learned? I learned that don't do this and learned and I did, but nobody says but nobody wants to talk about their dirty laundry and their cyber hacks. But it's it's like, that's how you learn, but nobody wants to talk about it. It's,</p>
<p>24:33</p>
<p>it's tough. Yeah, it's tough. So</p>
<p>24:36</p>
<p>let's put on our future hat a little bit. Where do you see it going? I mean, I mean, the speed is ridiculous. I mean, I don't know. I haven't. I have people talking about industry five Dotto already.</p>
<p>24:50</p>
<p>Well, I mean, I think they're the I mean, there's you know, AI is becoming irrelevant and another one that another top another thing that is emerging in the market is 5g with with with Communications right, and that is relevant across all of our members, right? Whether you're in a building a backhaul communications, you know, whether you're an industrial, you know, plant look at time center networking. You know, utilities, it's 5g connected micro grids or transportation with 5g. I mean, that's, that's something that's coming as well, in AI is going to become more prevalent. Everything's gonna become smarter, you know, members are making sense to the sensor technology is exploding across our industry, right? sensors are being used for everything across our members. And it's, you know, the data, tsunami is going to continue to occur. And I think, you know, our members that are getting more into, you know, while we still have members that still sell traditional products, you know, like wiring cable, we have members that are now selling systems, right? So it's, it's the hardware, it's the software, it's the communications, it's the network, it's the tunnel, this is the new soup to nuts solution,</p>
<p>26:01</p>
<p>because I tell us, because, again, my hat on, I don't want to go to, Hey, I got to go to Acme. And then when I pick that thing up from Acme, I'm going to go to this other company. I'm going to pick that up, and then I'm going to try to fit it together me And no, I'm looking for. I'm looking for a complete solution. That actually, because I don't want it. I don't want to have the problems. It's like, I turned the key on. And this whole thing just sort of fell apart. Now I'm just a mess. I don't want that. So, find reputable. Go to NEMA man find reputable businesses that do that. I would</p>
<p>26:42</p>
<p>great. I mean, headaches. Know that the industry is emerging. I love it. I mean, I'm an engineer by background so I sucked this stuff up. And all this new technology is great. It's it's great working with the members because you know, they'll tell you when you're doing great. They'll tell you when you're doing wrong. So that's that's good reaffirmation. I've enjoyed it. I mean, I've been here almost nine years now. It's never</p>
<p>27:07</p>
<p>and I'll say it it's dead sexy from my perspective, because I think it's just so cool. I think it is. And And to your point. You guys are so innovative. You think differently. I would imagine you bet your family just let's talk and talk to you about</p>
<p>27:26</p>
<p>like, it comes bad.</p>
<p>27:31</p>
<p>No, that's the case. I happen with my my kids. Like, yeah, I gotta go Dad, I gotta run. I gotta In fact, I gotta run fast and get away from you now.</p>
<p>27:42</p>
<p>My son has been after me to get to the Tesla from friends for ages. Not right.</p>
<p>27:48</p>
<p>That's cool. You got it. That's pretty cool. Yeah. You'd be all into that man. Yeah. I love that. Okay. Are you active out there on LinkedIn?</p>
<p>27:58</p>
<p>Yes, Sam. I am very much so.</p>
<p>28:01</p>
<p>So the way I would probably find him listeners would be of course, Steve. St. Louis Griffith. And I'm sure there's a handful of Griffiths out there. Yeah. That's Dr. IFF iith. Put a little comma in there. Slap in NEMA. And you'll find the jet.</p>
<p>28:19</p>
<p>Yeah, absolutely. You are</p>
<p>28:21</p>
<p>awesome. Great to wrap it up, because I can continue having this conversation all day long. But I'm sure there are listeners out there saying all right, I got it. She got along. Great. Wonderful. And listeners, we're gonna wrap it up on those other side, you know that I'm going to have all Steve's contact information. So don't come to me and say, Scott, I can't find Steve. Industrial talk.com. That's where his information will be. Got it. So stay tuned, we will be right back.</p>
<p>28:52</p>
<p>You're listening to the industrial talk Podcast Network.</p>
<p>29:01</p>
<p>All right. That is Steve Griffith. You need to reach out to him. He's got a madstad card out there on LinkedIn. I'm sure he would like to be able to connect with you telling you you're not going to be disappointed. He is. I mean, he's, he's got his finger on the pulse. And that's what you need. Because we're all about collaborating. We're all about innovating. We're all about educating. We're all about doing it with this sense of speed and purpose. And Doug gotta be tenacious about it. industry for Dotto is here, right? There is no no excuse for not knowing it. And learning from people like Steve. All right, again, get your calendars out I want you to write down for December 1 through the third. This is a virtual event because it is everything's virtual industrial IoT world is putting this on it is sees IoT now for Lastly, digital transformation. Do not come to me and say Scott, I'm not I can't connect because it's gonna all be out there on industrial talk.com every link that you need to know all right. Be brave, dare greatly hang out with people that are bold, brave and daring greatly you will not be disappointed. Another interview right around the corner so be safe</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/steve-griffith-with-nema-talks-about-industrial-ai-and-cybersecurity-for-future-success/">Mr. Steve Griffith with NEMA talks about Industrial AI and Cybersecurity for Future Success</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://industrialtalk.com/episodes/steve-griffith-with-nema-talks-about-industrial-ai-and-cybersecurity-for-future-success/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://podcasts.captivate.fm/media/6f2a1544-bb8a-4eee-ac47-9e24fd29cf22/steve-griffith-interview.mp3" length="39031590" type="audio/mpeg" />

			</item>
		<item>
		<title>Live From IoT World Congress Mr. Lucas Catranis with Irdeto talks Cyber Security in this World of Industry 4.0</title>
		<link>https://industrialtalk.com/episodes/iicvoice-lucas-catranis-irdeto-cybersecurity/</link>
					<comments>https://industrialtalk.com/episodes/iicvoice-lucas-catranis-irdeto-cybersecurity/#respond</comments>
		
		<dc:creator><![CDATA[Scott MacKenzie]]></dc:creator>
		<pubDate>Mon, 03 Feb 2020 15:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://industrialtalk.com/captivate-podcast/iicvoice-lucas-catranis-irdeto-cybersecurity/</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/iicvoice-lucas-catranis-irdeto-cybersecurity/">Live From IoT World Congress Mr. Lucas Catranis with Irdeto talks Cyber Security in this World of Industry 4.0</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="cfm-player-iframe" style="width: 100%; height: 170px; margin-bottom: 20px; border-radius: 10px; overflow:hidden; border: 1px solid #d6d6d6;"><iframe style="width: 100%; height: 170px;" frameborder="no" scrolling="no" seamless allow="autoplay" src="https://player.captivate.fm/51c1edfd-df07-422e-be67-372bf3ee5159"></iframe></div><p></p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/iicvoice-lucas-catranis-irdeto-cybersecurity/">Live From IoT World Congress Mr. Lucas Catranis with Irdeto talks Cyber Security in this World of Industry 4.0</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://industrialtalk.com/episodes/iicvoice-lucas-catranis-irdeto-cybersecurity/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://podcasts.captivate.fm/media/07be056e-cc8a-4849-b820-6ac9d68c9c31/lucas-catranis-interview.mp3" length="22489903" type="audio/mpeg" />

			</item>
		<item>
		<title>Live From IoT World Congress Mr. Willem-Jan Bruin with nCipher talks Cyber Security and Industry 4.0</title>
		<link>https://industrialtalk.com/episodes/iicvoice-willem-jan-bruin-with-ncipher-talks-cyber-security-and-industry-40/</link>
					<comments>https://industrialtalk.com/episodes/iicvoice-willem-jan-bruin-with-ncipher-talks-cyber-security-and-industry-40/#respond</comments>
		
		<dc:creator><![CDATA[Scott MacKenzie]]></dc:creator>
		<pubDate>Wed, 29 Jan 2020 15:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://industrialtalk.com/captivate-podcast/iicvoice-willem-jan-bruin-with-ncipher-talks-cyber-security-and-industry-40/</guid>

					<description><![CDATA[<p>Live from IoT Solutions World Congress, IIC Voice Podcast interviews Willem-Jan Bruin, Head of EMEA Business Development and Partner Alliance at nCipher Security. Live From IoT World Congress Mr. Willem-Jan Bruin with nCipher talks Cyber Security and Industry 4.0 Block Chain, IoT, IIoT, AI, ML and Cloud all have needs for powerful Cyber Security strategies&#8230;</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/iicvoice-willem-jan-bruin-with-ncipher-talks-cyber-security-and-industry-40/">Live From IoT World Congress Mr. Willem-Jan Bruin with nCipher talks Cyber Security and Industry 4.0</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="cfm-player-iframe" style="width: 100%; height: 170px; margin-bottom: 20px; border-radius: 10px; overflow:hidden; border: 1px solid #d6d6d6;"><iframe style="width: 100%; height: 170px;" frameborder="no" scrolling="no" seamless allow="autoplay" src="https://player.captivate.fm/3a6326be-d284-4bdb-9f95-d83bd1a4a0e4"></iframe></div><p>Live from <a href="https://www.iotsworldcongress.com/" target="_blank" rel="noopener">IoT Solutions World Congress</a>, <a href="https://industrialtalk.com/iic-voice/" target="_blank" rel="noopener">IIC Voice Podcast</a> interviews Willem-Jan Bruin, Head of EMEA Business Development and Partner Alliance at <a href="https://www.ncipher.com/" target="_blank" rel="noopener">nCipher Security</a>. Live From IoT World Congress Mr. Willem-Jan Bruin with nCipher talks Cyber Security and Industry 4.0 Block Chain, IoT, IIoT, AI, ML and Cloud all have needs for powerful Cyber Security strategies and solutions.&nbsp;WJ and his team at nCipher are driven to help you secure your Industry 4.0 strategy now and in the future.&nbsp;Get the answers to your &#8220;How&#8221; questions along with W.J's unique insight on where it's all headed on this IIC Voice Podcast interview!</p>
<p>You can find out more about W.J. and the wonderful team at nCipher from this interview and the links below. Finally, get your exclusive free access to the <a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener">Industrial Academy</a> and webinar access to &#8220;Building a Better Industrial Sales and Marketing Platform for Greater Success in 2020&#8221;.&nbsp;All links designed for keeping you current in this rapidly changing Industrial Market.&nbsp;Learn! Grow! Enjoy!</p>
<h2>WILLEM-JAN BRUIN CONTACT INFORMATION:</h2>
<p><strong>Personal LinkedIn:</strong> <a href="https://www.linkedin.com/in/willemjanbruin/" target="_blank" rel="noopener">https://www.linkedin.com/in/willemjanbruin/</a></p>
<p><strong>Company LinkedIn:</strong>&nbsp;<a href="https://www.linkedin.com/company/nciphersecurity/" target="_blank" rel="noopener">https://www.linkedin.com/company/nciphersecurity/</a></p>
<p><strong>Company Website:&nbsp;&nbsp;</strong><a href="https://www.ncipher.com/" target="_blank" rel="noopener">https://www.ncipher.com/</a></p>
<p><strong>IIC Twitter:</strong> <a href="https://twitter.com/" target="_blank" rel="noopener">https://twitter.com/</a></p>
<p><strong>IIConsortium IIC Company Website: </strong><a href="https://www.iiconsortium.org/" target="_blank" rel="noopener">https://www.iiconsortium.org/</a></p>
<h2>PODCAST VIDEO:</h2>
<p><iframe loading="lazy" title="Live From IoT World Congress Mr. Willem-Jan Bruin with nCipher talks Cyber Security and Industry 4.0" width="500" height="281" src="https://www.youtube.com/embed/LecfZWohni8?feature=oembed" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<h2>Industrial Academy (One Month Free Access And One Free Licence For Future Industrial Leader):</h2>
<p><a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-admin/wp-content/uploads/2019/10/Industrial-Academy-Graphic.png" height="538" width="1024"></a></p>
<h2>Industrial Talk Free Webinars:</h2>
<p><a href="https://industrialtalk.com/webinar-industrial-marketing-sales/" target="_blank" style="color: black" rel="noopener"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-content/uploads/2019/11/Sales-and-marketing-graphic.png" height="407" width="775"></a></p>
<h2>Business Beatitude The Book</h2>
<p><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-content/uploads/2019/10/BB-Book-Cover.png" height="212" width="136"></p>
<p class="ql-align-center">Do you desire a more joy-filled, deeply-enduring sense of accomplishment and success? Live your business the way you want to live with the BUSINESS BEATITUDES&#8230;The Bridge connecting sacrifice to success.&nbsp;<strong>YOU NEED THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><strong>TAP INTO YOUR INDUSTRIAL SOUL, RESERVE YOUR COPY NOW! BE BOLD. BE BRAVE. DARE GREATLY AND CHANGE THE WORLD.&nbsp;GET THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><a href="https://industrialtalk.com/business-beatitude-reserve/" target="_blank" rel="noopener"> Reserve My Copy and My 25% Discount</a></p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/iicvoice-willem-jan-bruin-with-ncipher-talks-cyber-security-and-industry-40/">Live From IoT World Congress Mr. Willem-Jan Bruin with nCipher talks Cyber Security and Industry 4.0</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://industrialtalk.com/episodes/iicvoice-willem-jan-bruin-with-ncipher-talks-cyber-security-and-industry-40/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://podcasts.captivate.fm/media/5f99c436-1c2e-4b6c-9296-adf9269002d5/willem-bruin-interview.mp3" length="25893775" type="audio/mpeg" />

			</item>
		<item>
		<title>Live From IoT World Congress: Mr. Kevin Gillick with GlobalPlatform Is Talking about the Future of Cyber Security</title>
		<link>https://industrialtalk.com/episodes/iicvoice-kevin-gillick-globalplatform/</link>
					<comments>https://industrialtalk.com/episodes/iicvoice-kevin-gillick-globalplatform/#respond</comments>
		
		<dc:creator><![CDATA[Scott MacKenzie]]></dc:creator>
		<pubDate>Wed, 08 Jan 2020 15:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://industrialtalk.com/captivate-podcast/iicvoice-kevin-gillick-globalplatform/</guid>

					<description><![CDATA[<p>Live from IoT Solutions World Congress, IIC Voice Podcast interviews Kevin Gillick, Executive Director at GlobalPlatform. In his interview, Kevin discusses the pressing need for Cyber Security standardization in the world of Industry 4.0. The GlobalPlatform organization and members focus on setting Cyber Security standards from connected cars to wearables and everything in between. Get&#8230;</p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/iicvoice-kevin-gillick-globalplatform/">Live From IoT World Congress: Mr. Kevin Gillick with GlobalPlatform Is Talking about the Future of Cyber Security</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="cfm-player-iframe" style="width: 100%; height: 170px; margin-bottom: 20px; border-radius: 10px; overflow:hidden; border: 1px solid #d6d6d6;"><iframe style="width: 100%; height: 170px;" frameborder="no" scrolling="no" seamless allow="autoplay" src="https://player.captivate.fm/6bdb4b6d-5622-4510-8ff6-83dba220eb69"></iframe></div><p>Live from <a href="https://www.iotsworldcongress.com/" target="_blank" rel="noopener">IoT Solutions World Congress</a><a href="http://inforum.infor.com/" target="_blank" rel="noopener">,</a> <a href="https://industrialtalk.com/iic-voice/" target="_blank" rel="noopener">IIC Voice Podcast</a> interviews Kevin Gillick, Executive Director at <a href="https://globalplatform.org/" target="_blank" rel="noopener">GlobalPlatform</a>. In his interview, Kevin discusses the pressing need for Cyber Security standardization in the world of Industry 4.0.  The GlobalPlatform organization and members focus on setting Cyber Security standards from connected cars to wearables and everything in between. Get the answers to your <strong>Why</strong> questions about <strong>Cyber Security Standards</strong> along with Kevin's unique insight on where it's all headed on this IIC Voice Podcast interview!</p>
<p>You can find out more about Kevin and the wonderful team at GlobalPlatform from this interview and the links below.&nbsp;Finally, get your exclusive free access to the <a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener">Industrial Academy</a> and webinar access to &#8220;Building a Better Industrial Sales and Marketing Platform for Greater Success in 2020&#8221;.&nbsp;All links designed for keeping you current in this rapidly changing Industrial Market.&nbsp;Learn! Grow! Enjoy!</p>
<h2>KEVIN GILLICK CONTACT INFORMATION:</h2>
<p><strong>LinkedIn:</strong> <a href="https://www.linkedin.com/in/kevin-gillick-8243897/" target="_blank" rel="noopener">https://www.linkedin.com/in/kevin-gillick-8243897/</a></p>
<p><strong>Company LinkedIn:</strong> <a href="https://www.linkedin.com/company/globalplatform/" target="_blank" rel="noopener">https://www.linkedin.com/company/globalplatform/</a></p>
<p><strong>Company Website:</strong> <a href="https://globalplatform.org/" target="_blank" rel="noopener">https://globalplatform.org/</a></p>
<p><strong>IIC Twitter: </strong><a href="https://twitter.com/IIConsortium" target="_blank" rel="noopener">https://twitter.com/IIConsortium</a></p>
<p><strong>IIC Company Website</strong> <a href="https://www.iiconsortium.org/" target="_blank" rel="noopener">https://www.iiconsortium.org/</a></p>
<h2>Industrial Academy (One Month Free Access And One Free Licence For Future Industrial Leader):</h2>
<p><a href="https://industrialtalk.com/wp-admin/inforum-industrial-academy-discount/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-admin/wp-content/uploads/2019/10/Industrial-Academy-Graphic.png" height="538" width="1024"></a></p>
<h2>Industrial Talk Free Webinars:</h2>
<p><a href="https://industrialtalk.com/webinar-industrial-marketing-sales/" target="_blank" style="color: black" rel="noopener"><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-content/uploads/2019/11/Sales-and-marketing-graphic.png" height="328" width="624"></a></p>
<h2>Business Beatitude The Book</h2>
<p><img loading="lazy" decoding="async" src="https://industrialtalk.com/wp-content/uploads/2019/10/BB-Book-Cover.png" height="800" width="512"></p>
<p class="ql-align-center">Do you desire a more joy-filled, deeply-enduring sense of accomplishment and success? Live your business the way you want to live with the BUSINESS BEATITUDES&#8230;The Bridge connecting sacrifice to success.&nbsp;<strong>YOU NEED THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><strong>TAP INTO YOUR INDUSTRIAL SOUL, RESERVE YOUR COPY NOW! BE BOLD. BE BRAVE. DARE GREATLY AND CHANGE THE WORLD.&nbsp;GET THE BUSINESS BEATITUDES!</strong></p>
<p class="ql-align-center"><a href="https://industrialtalk.com/business-beatitude-reserve/" target="_blank" rel="noopener"> Reserve My Copy and My 25% Discount </a></p>
<p></p>
<p>The post <a rel="nofollow" href="https://industrialtalk.com/episodes/iicvoice-kevin-gillick-globalplatform/">Live From IoT World Congress: Mr. Kevin Gillick with GlobalPlatform Is Talking about the Future of Cyber Security</a> appeared first on <a rel="nofollow" href="https://industrialtalk.com">Industrial Talk</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://industrialtalk.com/episodes/iicvoice-kevin-gillick-globalplatform/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://podcasts.captivate.fm/media/8799e71c-585b-4c49-b040-f698a6a1c49a/kevin-gillick-interview.mp3" length="26317355" type="audio/mpeg" />

			</item>
	</channel>
</rss>
