Endpoint Security , Internet of Things Security , Network Firewalls, Network Access Control

Convergence of OT and IoT: The Security Challenges

Tenable's Richard Bussiere on Re-evaluating Security Processes
Richard Bussiere, director of product management, APAC, Tenable Network Security

Upcoming enterprise IoT ecosystems and conventional OT networks share similar security challenges, and as the two converge, organizations need to re-evaluate core security processes, says Richard Bussiere of Tenable Network Security.

See Also: The Business Case for Data Diode Security

In this video interview at the recent RSA APJ 2018 conference in Singapore, Bussiere discusses:

  • The similarities in the security gaps/challenges in OT and IoT;
  • The convergence of OT and IoT ecosystems;
  • The outlook and recommendations.

Bussiere is director of product management, APAC, for Tenable Network Security. He has more than 20 years of experience in ICT security, computer networking and engineering. He frequently assists organizations in adopting a regimen of proactive vulnerability management to help them reduce their vulnerabilities. Previously, Bussiere was technical director in APAC for Tenable and served as Arbor Network's solution architect in the region.


About the Author

Varun Haran

Varun Haran

Managing Director, Asia & Middle East, ISMG

Haran has been a technology journalist in the Indian market for over six years, covering the enterprise technology segment and specializing in information security. He has driven multiple industry events such as the India Computer Security Conferences (ICSC) and the first edition of the Ground Zero Summit 2013 during his stint at UBM. Prior to joining ISMG, Haran was first a reporter with TechTarget writing for SearchSecurity and SearchCIO; and later, correspondent with InformationWeek, where he covered enterprise technology-related topics for the CIO and IT practitioner.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.