IT-OT Convergence: Taking the Right Security MeasuresMeralco's Mel Migriño on How to Ensure OT Security
In addition to doing asset inventory, it is important to profile the risks of each asset to ensure OT security, says Mel Migriño, vice president and group CISO at Meralco, the largest power distribution unit in the Philippines. (See: Applying 'Zero Trust' to OT Environment).
"It is important to identify security risks with each asset and how they can impact your current environment, assuming these threats are actually realized. And then once you have that, then you should design appropriate controls," she says.
In a video interview with Information Security Media Group, Migriño discusses:
- How the threat landscape is evolving with IT-OT convergence;
- Detection of anomalies in an OT environment;
- The various security steps for OT security.
Migriño is the vice president and group CISO of Meralco, the largest power distribution conglomerate in the Philippines. She has more than 15 years of combined experience in cyber governance, application and infrastructure security, operational technology security, business continuity, privacy, IT audit, and project management across multiple industries.