Listen on Apple Podcast  |  Listen on Spotify  |  Listen on Google Podcasts

On this IoT For All podcast episode, Michael Murray, Senior Vice President and General Manager of Cyber-Physical Systems at BlackRidge Technology explains the difference between cybersecurity and cyber-physical security. Michael also discusses how with great connectivity comes great responsibility.

Michael provides insight into how the IoT industry has evolved over the last 20 years and how BlackRidge Technology’s philosophy on security differs from other cybersecurity companies with a proactive vs. reactive approach. He also addresses why—more often than not—security is an afterthought for IoT deployments. Who is actually responsible for security on deployments?

The episode concludes with a discussion on the differences between IT and OT and their ultimate convergence. Finally, Michael shares advice for organizations seeking to secure their new and already deployed devices.

If you’re interested in connecting with Michael, check out his LinkedIn or Twitter!

About BlackRidge Technology: BlackRidge Technology enables customers and partners to deliver more secure and resilient business services in today’s rapidly evolving cyber threat environments. The BlackRidge adaptive cyber defense solution authenticates identity before allowing network connections in order to proactively isolate cloud services, protect servers and IoT devices, and segment networks.

Key Question and Topics from this Episode:

(4:18) How has the IoT industry evolved over Michael’s 20 years of experience in the space? 

(6:05) Why is security oftentimes an afterthought for IoT deployments? 

(8:22) Where should the responsibility of security be placed? 

(9:16) How does BlackRidge Technology fit into the IoT security landscape?

(12:14) How does BlackRidge’s security approach differ from other cybersecurity companies?

(21:20) What is “Cyber-Physical Security”?

(26:03) How can consumers and enterprises in IoT protect themselves from cyber attacks? 

(33:39) IT vs. OT — what are the differences and how are they connected? 

(38:43) What advice does Michael have for organizations looking to secure their new devices and already deployed devices? 

Hosted By
IoT For All
IoT For All
IoT For All is creating resources to enable companies of all sizes to leverage IoT. From technical deep-dives, to IoT ecosystem overviews, to evergreen resources, IoT For All is the best place to keep up with what's going on in IoT.
IoT For All is creating resources to enable companies of all sizes to leverage IoT. From technical deep-dives, to IoT ecosystem overviews, to evergreen resources, IoT For All is the best place to keep up with what's going on in IoT.