Aug. 23, 2022, 10:57 p.m. | Sean Martin, ITSPmagazine, Rock Lambros, Crucial Conversations

Redefining CyberSecurity redefining-cybersecurity.simplecast.com

Operational Technology (OT) and Information Technology (IT) have historically been managed by separate teams. But with cyberattacks targeting IoT devices on OT systems in recent years and opening the possibility of breaches spilling over to IT networks (and vice versa), OT and IT teams realize just how much they need each other.

acquisitions artificial intelligence black hat blackhat breaches business business of security chief information security officer cio ciso cloud security convergence conversation cto cyberattacks cybersecurity cyberwarfare data breaches defcon devices digital security digital transformation diversity in cybersecurity hackers hacking healthcare information information technology infosec infosec jobs innovation internet iot iot devices managed market analysis networking networks operational operational technology ot systems pentesting privacy program management risk management rock lambros security security operations systems targeting teams technology threat intelligence versa vice

More from redefining-cybersecurity.simplecast.com / Redefining CyberSecurity

Embedded VSOC Analyst

@ Sibylline Ltd | Australia, Australia

Cloud Security Platform Engineer

@ Google | London, UK; United Kingdom

Senior Associate Cybersecurity GRC - FedRAMP

@ Workday | USA, VA, McLean

Senior Incident Response Consultant, Mandiant, Google Cloud

@ Google | Mexico; Colombia

Cyber Software Engineering, Advisor

@ Peraton | Fort Gordon, GA, United States

Cloud Security Architect (Federal)

@ Moveworks | Remote, USA