Endpoint Security , Governance & Risk Management , Internet of Things Security

OT Security Is More Than Just Cybersecurity

Schneider Electric's Andre Shori on Who Owns OT Security Risk
Andre Shori, CISO, APAC, Schneider Electric

While IT-OT convergence is accelerating, awareness and maturity of OT technologies still have a long road ahead. In this transition, organizations need to ensure the safety and health of workers is always the top priority for OT security, said Andre Shori, CISO, APAC with Schneider Electric.

See Also: The State of Organizations' Security Posture as of Q1 2018

"There is still a long way to go in terms of being where I would feel that we are at a comfortable maturity or something equivalent to where we are with IT security today," Shori said. "A lot of legislation, for example, is focused on critical infrastructure, but even what constitutes critical infrastructure can change from country to country. We need a little bit of normalization and consensus in terms of what constitutes critical infrastructure."

In this video interview with Information Security Media Group, Shori discussed:

  • Who owns OT security;
  • Schneider Electric's OT security road map for the next two years;
  • What is next with IT-OT convergence.

Shori is responsible for leading, animating and implementing IT and OT cybersecurity programs in the region for Schneider Electric. He has more than 30 years of cybersecurity experience.


About the Author

Suparna Goswami

Suparna Goswami

Associate Editor, ISMG

Goswami has more than 10 years of experience in the field of journalism. She has covered a variety of beats including global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia, where she wrote about the Indian startup ecosystem. She has also worked with UK-based International Finance Magazine and leading Indian newspapers, such as DNA and Times of India.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.