Endpoint Security , Enterprise Mobility Management / BYOD , Internet of Things Security

IoT: The New Industrial Revolution

Cisco's Michael Shannon on Securing the Convergence of IT, OT and Devices
Michael Shannon, Vice President, Engineering, IoT Business Group, Cisco

Legacy technology. Connected devices. Third-party access risks. Industrial sites face the same IT and OT challenges as other business enterprises, yet often they are overlooked. Michael Shannon of Cisco shares insights on IT/OT convergence and security transformation.

In a video interview with Information Security Media Group, Shannon discusses:

  • The shifting industrial threat landscape;
  • IT/OT convergence and collaboration;
  • How to improve security amidst this new industrial revolution.

Shannon is VP of Engineering for Cisco's IoT Business group. His organization develops scalable and modular products to enable IoT digitization with focus on the extended enterprise and in the manufacturing, oil and gas, utilities, public sector and smart city verticals.The teams’ products include a portfolio of industrial networking products (switching/routing/wireless), and a comprehensive range of software solutions to help organizations digitize industrial operations, such as an ICS visibility and threat detection solution, an edge to multi-cloud OT data collection solution, IoT/OT-focused network and device management suite, and a SaaS service that provides connectivity for IoT devices in LTE, NB-IoT and 5G networks.

About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing devicesecurity.io, you agree to our use of cookies.