BRKSEC-3005 – An IoT Security Model for Securing IT-OT Assets
Presenter: Jeff Schutt – Cybersecurity Solutions Architect (Jeff works in Adv Services in the IoT team)
Full Title: An IoT Security Model & Architecture for Securing Cyber-Physical and IT-OT Converged Assets

Mix of IT/OT folks in the room.
How do we do physical security?
- Protect the perimeter
- Detect breaches
- Situational awareness (<< THIS!)
- Forensics
How do we do cybersecurity?
- Same principles!
- Just different tools
IT landscape
- Systems approach
- Requirements dominated by business data focus
- Time horizon: driven by Moore’s law and high tech product cycles
- Scale: 1000s
- Security: built into protocols (IPsec, TLS)
OT landscape
- Requirements dominated by needs of physical systems
- Time horizon driven by capital equipment life; complete lifecycle determined and managed by engineers
- Scale: few; 10s – 100s
- Security: No access to outside systems; insecure protocols
With IT and OT convergence, ther’s no way people are going to lose their jobs. We all have too much to do for anyone to be redundant. Additionally, there is a well-known shortage of skilled workers in this area.
Security awareness and training: a combination of people, process, and technology.
“Airgap security” does not address “people, process and technology”. Airgap is NOT security (on its own). Airgap is not Continue reading
CIsco's ACI videos look at diagnosing and solving slow email access and setting up DevOps automation workflows.
Registration is now open! Find out more about VIRL in the Cisco DemoFriday and learn how your organization can use VIRL to free up space for your architects and engineers.
Juniper loses a big name to the world outside Silicon Valley.