Governance & Risk Management , Operational Technology (OT) , Video

Building Effective OT Security Strategies

Anthony Perry of FedEx on OT Program Development and Continuous Improvement
Anthony Perry, director IT and OT/IoT security, FedEx

OT systems are the backbone of critical infrastructure. Anthony Perry, director IT and OT/IoT security at FedEx, shared strategies for developing robust OT security programs. At FedEx, the focus on OT and IoT security has grown over the past several years, driven by the need to protect the company's automation processes, Perry said.

See Also: Frost Radar™ on Healthcare IoT Security in the United States

Perry's team at FedEx began by segmenting the global network and refining security measures at key locations. Integrating IT and OT under one umbrella allowed for a unified approach to security, addressing vulnerabilities effectively, he said.

"How do you start an OT program from scratch? From assessment to inventory asset management - the whole nine yards. You find most of us working to mature our programs. And that's a constant battle," Perry said.

In this video interview with Information Security Media Group at the Cyber Security for Critical Assets USA Summit in Houston, Perry also discussed:

  • Using common tools across IT and OT to enhance security measures;
  • Continuous assessment to address evolving vulnerabilities;
  • Creative resource allocation for effective OT risk management.

Perry's expertise includes information technology and security infrastructure, budget management, and designing, implementing, and supporting enterprise IT environments.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.