Endpoint Security , Governance , Internet of Things Security

OT Security: Best Practices for CISOs

L&T Group CISO Uday Deshpande on Securing Operational Technology
Uday Deshpande, CISO, L&T Group

The lack of standardization is one of the significant challenges when securing OT environments. Customizing and aligning OT security with the business is key, says Uday Deshpande, CISO at Mumbai-based L&T Group.

See Also: Webinar | The Future of Adaptive Authentication in Financial Services

"The awareness is definitely rising. ... More and more organizations are beginning to integrate OT environments to their core platforms," he says. "In traditional security, we exercise security-by-design principles, and you have to extend those to OT."

Deshpande believes security practitioners need to get more involved in these OT projects.

In a video interview at Information Security Media Group's recent Mumbai Security Summit, Deshpande discusses:

  • The state of the OT ecosystem;
  • Gaps and challenges in securing OT;
  • Best practices for CISOs and security leaders.

Deshpande is the CISO for Larsen & Toubro group of companies, with the overall responsibility for security for L&T companies in defense, construction, power, smart cities, and realty. He has more than 22 years of experience leading global information security programs, enterprise risk management and compliance projects, and was previously the CISO for Tata Motors.


About the Author

Varun Haran

Varun Haran

Managing Director, Asia & Middle East, ISMG

Haran has been a technology journalist in the Indian market for over six years, covering the enterprise technology segment and specializing in information security. He has driven multiple industry events such as the India Computer Security Conferences (ICSC) and the first edition of the Ground Zero Summit 2013 during his stint at UBM. Prior to joining ISMG, Haran was first a reporter with TechTarget writing for SearchSecurity and SearchCIO; and later, correspondent with InformationWeek, where he covered enterprise technology-related topics for the CIO and IT practitioner.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.