1. EachPod

Bridging IT and OT: Exploring Machine Identity and MFA in Cybersecurity with Anusha Iyer

Author
Aaron Crow
Published
Wed 29 Jan 2025
Episode Link
https://www.listennotes.com/e/c6591f87766c4058856ffdaf5da1842b

Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)
Episode: Bridging IT and OT: Exploring Machine Identity and MFA in Cybersecurity with Anusha Iyer
Pub date: 2025-01-27

Get Podcast Transcript →
powered by Listen411 - fast audio-to-text and summarization



In this episode, host Aaron Crow engages in a riveting conversation with Anusha Iyer, the CEO and founder of Corsha, a Washington, D.C.-based cybersecurity company. With over 25 years of experience in the cybersecurity space and a newfound interest in operational technology (OT), Anusha shares insights into her company's innovative approach to identity and access management for machines.


The discussion covers key topics such as the convergence of IT and OT, the essential need to understand machine-to-machine communication, and the revolutionary potential of machine identity and multi-factor authentication (MFA) in securing industrial environments. Aaron and Anusha explore practical strategies for bridging IT and OT gaps and highlight real-world examples of implementing zero-trust principles.


This episode is a treasure trove of knowledge for cybersecurity professionals, OT engineers, and tech enthusiasts alike. It emphasizes how modern security measures can transform and protect critical infrastructure. Tune in to gain valuable insights into the future of OT cybersecurity and the importance of embracing comprehensive security measures.





Key Moments: 


 


06:16 Machine Identity in OT Environments


08:40 Machine MFA for Secure Access


10:23 Understanding Secure Endpoint Communication


14:07 Cybersecurity vs. Safety Concerns


17:37 Achieving Zero Trust in Network Security


20:50 Overcoming Cloud Security Fears


26:10 Tech Implementation and Management Challenges


31:54 Complex Architecture: Costly and Complex


36:05 Understanding System Data Flow Benefits


40:36 Technology Deployment Before Cybersecurity Era


47:50 Simplifying Machine Implementation Benefits


51:19 Manual System Updates Challenges


51:58 Balancing IT and OT Efficiency


 


About the guest : 


 


Anusha Iyer is the Founder and CEO of Corsha - a leader in identity and access management for operational systems and critical infrastructure. With over 20 years in cybersecurity, Anusha is passionate about demystifying cyber and security, making it accessible, easy to adopt, and self-assuring.


Reach out to Anusha at [email protected] if you want to talk OT and Cyber and how to use machine identity in your industrial networks to unlock secure automation.


 


Find out more about Corsha and request a demo here: https://corsha.com/request-a-demo


Connect With Aaron Crow:



 


Learn more about PrOTect IT All:



 


To be a guest or suggest a guest/episode, please email us at [email protected]





Please leave us a review on Apple/Spotify Podcasts:


Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124


Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4



The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Share to: