Cyber Work
Infosec
Categories: Technology
Listen to the last episode:
Today on Cyber Work, our deep-dive into manufacturing and operational technology (OT) cybersecurity brings us to the problem of endpoint security. Tom Molden, CIO of Global Executive Engagement at Tanium, has been grappling with these problems for a while. We talk about his early, formative tech experiences (pre-Windows operation system!), his transformational position moving from fiscal strategy and implementation into his first time as chief information officer and talk through the interlocking problems that come from connected manufacturing devices and the specific benefits and challenges to be found in strategizing around the endpoints. All of the endpoints.
0:00 - Manufacturing and endpoint security
1:44 - Tom Molden's early interest in computers
4:06 - Early data usage
6:26 - Becoming a CIO
10:29 - Difference between a CIO and CISO
14:57 - Problems for manufacturing companies
18:45 - Best CIO problems to solve in manufacturing
22:51 - Security challenges of manufacturing
26:00 - The scop of endpoint issues
33:27 - Endpoints in manufacturing security
37:12 - How to work in manufacturing security
39:29 - Manufacturing security skills gaps
41:54 - Gain manufacturing security work experience
43:41 - Tom Molden's best career advice received
46:26 - What is Tanium
47:58 - Learn more about Tom Molden
48:34 - Outro
– Get your FREE cybersecurity training resources: https://www.infosecinstitute.com/free
– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast
About Infosec
Infosec’s mission is to put people at the center of cybersecurity. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and phishing training to stay cyber-safe at work and home. More than 70% of the Fortune 500 have relied on Infosec Skills to develop their security talent, and more than 5 million learners worldwide are more cyber-resilient from Infosec IQ’s security awareness training. Learn more at infosecinstitute.com.
Previous episodes
-
434 - Working as a CIO and the challenges of endpoint security| Guest Tom Molden Mon, 15 Apr 2024
-
433 - Are you ready for the CCNA exam? Test yourself with these questions | Cyber Work Hacks Thu, 11 Apr 2024
-
432 - Working in manufacturing security: Top challenges and career advice | Guest Theresa Lanowitz Mon, 08 Apr 2024
-
431 - Modern industrial control system security issues | Guest Thomas Pace Mon, 01 Apr 2024
-
430 - Passing the CCNA exam: Tips and tricks from an instructor | Cyber Work Hacks Thu, 28 Mar 2024
-
429 - CISSP is changing! Common body of knowledge changes for 2024 | Cyber Work Hacks Thu, 21 Mar 2024
-
428 - CISSP exam tips and tricks: Top test-taking strategies | Cyber Work Hacks Fri, 15 Mar 2024
-
427 - CISSP exam tips and tricks: Avoiding common mistakes | Cyber Work Hacks Mon, 11 Mar 2024
-
426 - What help do CISOs need in 2024? | Guest Alicia Olson Mon, 04 Mar 2024
-
425 - What a CISSP boot camp is like | Cyber Work Hacks Thu, 29 Feb 2024
-
424 - Ethical hacking careers vs. cinema: What it's like to work as a hacker | Cyber Work Live Mon, 26 Feb 2024
-
423 - Renewing your Security+ certification | Cyber Work Hacks Thu, 22 Feb 2024
-
422 - A career in dental cybersecurity? Drilling down into this unique role | Guest Tom Terronez Mon, 19 Feb 2024
-
421 - Security+ Boot Camp: What to expect during your training | Cyber Work Hacks Thu, 15 Feb 2024
-
420 - Are remote workers more security-savvy than on-premises? | Guest Joseph Nwanpka Mon, 12 Feb 2024
-
419 - Security+ exam questions and answers: What to expect | Cyber Work Hacks Fri, 09 Feb 2024
-
418 - 45 billion cyberattacks a day?! Media myths and working in cybersecurity | Guest Ken Westin Mon, 05 Feb 2024
-
417 - Security+ exam tips: What changed and how to pass the new exam | Cyber Work Hacks Mon, 29 Jan 2024
-
416 - The Wild West era of data collection is over | Guest Sean Falconer Mon, 22 Jan 2024
-
415 - Don't chase unicorns to fix the cybersecurity skills gap | Guest Adrianna Iadarola Mon, 08 Jan 2024
-
414 - Neurodiversity and cybersecurity leadership positions | Guest Anthony Pacilio Mon, 18 Dec 2023
-
413 - What it's like to be a CISO — and why they don't need more tech | Guest Dan Roberts Mon, 11 Dec 2023
-
412 - Empowering African Women through Cybersecurity | Guest Confidence Staveley Mon, 04 Dec 2023
-
411 - The transformative power of neurodiversity in cybersecurity practices | Guest Ian Campbell Mon, 27 Nov 2023
-
410 - National security cyber issues and Stanford’s cyber policy program | Guest AJ Grotto Mon, 13 Nov 2023
-
409 - The role of film storytelling in making education stick | Cyber Work Hacks Thu, 09 Nov 2023
-
408 - The future of passwords | Guest Tomas Smalakys Mon, 06 Nov 2023
-
407 - AI and the rise of DDoS attacks | Guest Anna Claiborne Mon, 30 Oct 2023
-
406 - How generative AI can be used by bad actors | Guest Oliver Tavakoli Mon, 23 Oct 2023
-
405 - How AI is affecting GRC and the future of cybersecurity | Guest Heather Buker Mon, 16 Oct 2023
-
404 - Finding and supporting neurodiverse cybersecurity professionals | Guest Tara D. Anderson Mon, 25 Sep 2023
-
403 - Cybersecurity investment and launching new companies | Guest Leslie Lynn Smith Mon, 18 Sep 2023
-
402 - Bringing coding skills to underserved communities | Guest Brianne Caplan Wed, 13 Sep 2023
-
401 - From software engineer to career coach for women in tech leadership | Guest Limor Bergman-Gross Mon, 28 Aug 2023
-
400 - ICS security, Blue Team Con and security work in the Air Force Reserve | Guest Lesley Carhart Mon, 21 Aug 2023
-
399 - Digital forensics careers: Facts versus fiction | Cyber Work Live Mon, 14 Aug 2023
-
398 - Uplifting women for leadership in the cybersecurity industry | Guest Katie O'Malley Mon, 07 Aug 2023
-
397 - The changing responsibilities of the CISO position | Guest Mike Scott Mon, 31 Jul 2023
-
396 - Crafting a basic disaster recovery plan | Cyber Work Hacks Thu, 29 Jun 2023
-
395 - Digital safety services and equity in cybersecurity | Guest Leigh Honeywell Mon, 26 Jun 2023
-
394 - Disaster recovery plans for small businesses | Guest Eric Sugar Mon, 12 Jun 2023
-
393 - Asset detection at home | Cyber Work Hacks Thu, 08 Jun 2023
-
392 - The nuts and bolts of asset detection and asset mapping | Guest Huxley Barbee Mon, 05 Jun 2023
-
391 - The current state of crypto crime | Guest Lili Infante Mon, 22 May 2023
-
390 - Is CompTIA’s Cloud+ certification right for you? | Cyber Work Hacks Thu, 11 May 2023
-
389 - Reframing cybersecurity automation and its uses | Guest Leonid Belkind Mon, 01 May 2023
-
388 - The fundamentals of GitHub | Cyber Work Hacks Thu, 27 Apr 2023
-
387 - Changing careers to cybersecurity | Guest Dara Gibson Mon, 24 Apr 2023
-
386 - Women Impact Tech’s work in the cybersecurity industry | Guest Paula Bratcher Ratliff Mon, 17 Apr 2023
-
385 - Optimizing your digital forensics profile while job searching | Cyber Work Hacks Thu, 13 Apr 2023