Listen "Securing The Industrial Internet of Things (IIOT): Supply Chain Risks"
Episode Synopsis
Welcome to "The Connected Frontier," the podcast exploring the cutting edge of technology and its impact on our world. Today, we're continuing the conversation on a topic we started in our first episode: securing the Industrial Internet of Things, or IIoT. In this episode we explore the critical vulnerabilities within the Industrial Internet of Things (IIoT) supply chain. The discussion highlights how the convergence of IT and OT expands the attack surface, making IIoT susceptible to unique threats. The episode uses real-world examples like the "rogue Raspberry Pi" incident and major supply chain attacks such as SolarWinds, Kaseya, and Codecov to illustrate the insidious nature of these vulnerabilities. Katherine emphasizes that third-party vendors are often the biggest supply chain vulnerability, with 59% of organizations experiencing a data breach due to a third party. The episode concludes by outlining three strategic pillars for securing IIoT environments: rigorous vendor vetting, comprehensive component transparency (including Software Bill of Materials and attestations), and robust Third-Party Risk Management. The host stresses that securing the IIoT ecosystem is a strategic business imperative, crucial for protecting critical infrastructure and the modern economy. Support the show
More episodes of the podcast The Connected Frontier
Cybersecurity Toolbox: What is SSE?
26/09/2025
Cybersecurity Toolbox: Email Protection
22/09/2025
Cybersecurity Toolbox: What is NAC?
15/09/2025
Cybersecurity Toolbox: What is IAM?
08/09/2025
Cybersecurity Toolbox: The Firewall
02/09/2025
Cybersecurity Toolbox: What is NDR?
25/08/2025
Cybersecurity Toolbox: What is EDR?
17/08/2025
Cybersecurity Toolbox: What is XDR?
10/08/2025