Endpoint Security , Open XDR

Industrial Enterprise IT/OT: Better Collaboration, But Not Perfect

Groups Increasingly Share Responsibilities, Says Tripwire's Tim Erlin
Tim Erlin, vice president of product management & strategy, Tripwire

Internet-connected devices inside the industrial enterprise: There are many more than people might think. But they're not always under the direct control of IT departments.

Take so-called operational technology, for example, which is in place everywhere from manufacturing plants and trains to planes and hospitals.

Securing industrial OT requires input from an organization's IT group, and vice versa. Historically, however, these two groups haven't always been great at communicating, says Tim Erlin of Tripwire. Thankfully, he says, that now appears to be changing.

In a video interview at the recent Infosecurity Europe conference in London, Erlin discusses:

  • Trends in the industrial security space;
  • The current state of IT/OT coordination and collaboration;
  • The potential impact of cyberattacks on SCADA and industrial control systems.

Erlin is the vice president of product management and strategy at Tripwire. In his 12 year tenure at nCircle, prior to its acquisition by Tripwire, he helped the vulnerability management business grow from having a handful of customers to more than 5,000. Erlin also managed nCircle's policy compliance and reporting products.


About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.