Bridging the Security Gap: How HERA Transforms Remote Access in Industrial Environments with Andrew Ginter

Welcome back to *Protect It All*! In Episode 17, host Aaron Crow is joined by Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, to dive deep into secure remote access for Operational Technology (OT) systems. They explore the cutting-edge HERA (Hardware Enforced Remote Access) technology, which offers a revolutionary approach to remote control via TPM hardware, unidirectional gateways, and stringent encryption protocols.  This episode covers everything from the critical need for robust security in high-stakes environments like wind farms and manufacturing to the dangers of supply chain vulnerabilities to the broader implications for industries dependent on remote operations. Ginter sheds light on the limitations of software-based solutions and the strategic advantages of hardware-enforced security, while also discussing his book "Engineering Great OT Security" and the latest initiatives in cyber-informed engineering.  Tune in to learn how organizations can remain competitive, reduce costs, and stay secure in an increasingly interconnected industrial world. This enlightening discussion could change the way you think about remote access!   Key Moments:    05:53 Spectrum of consequence in remote access explained. 07:55 Security flaws in remote access systems. 10:23 Remote access is often overlooked by many. 15:11 Supply chain vulnerability due to cloud connectivity. 17:33 Hardware-enforced remote access, HERA, fills the security spectrum. 20:52 Custom ASIC with 1M transistors for encryption. 25:55 Ways to exploit network security vulnerabilities discussed. 26:35 Exploiting technology to send unauthorized messages. 32:50 Benefits of centralizing engineering teams in businesses. 34:18 Competing in the international market with unique services. 39:31 Understanding the implications before implementing technology is crucial. 40:30 Uncertainty about large number, risk opportunity tap. 43:50 Firewall controls data flow and is potentially misconfigurable.   About the guest :    At Waterfall Security, Andrew leads a team of experts working with the world's most secure industrial sites. He is the author of three books on industrial security, co-author of the IIoT SF and the UITP Guide to CyberSecurity in Tendering, and co-host of the Industrial Security Podcast. Links: https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/hardware-enforced-remote-access-hera-under-the-hood/ LinkedIn: https://www.linkedin.com/in/andrewginter/ Email Andrew: andrew.ginter@waterfall-security.com  &n

Om Podcasten

Welcome to "PrOTect It All," the podcast where we peel back the layers of cybersecurity to reveal the core strategies, challenges, and triumphs of protecting our digital and operational landscapes. We're thrilled to have you on board for an upcoming episode! Your insights and experiences are invaluable to our listeners who are eager to learn and engage with the leading minds in IT and OT security. As we gear up to dive into conversation, please feel free to share any specific topics or stories you'd like to discuss. Our audience appreciates both the technical deep-dives and the high-level overviews, so bring your unique perspective, and let's make cybersecurity accessible and engaging together. Thank you for joining us on this journey to foster a more secure future. We can't wait to hear your voice on the "PrOTect It All" podcast!