ENG
FR
Go Back
Cyber Security

Manufacturing Cybersecurity: Bridging IT & OT for Operational Excellence with Tom Molden from Tanium

Cybersecurity in Manufacturing with Tom Molden from Tanium

As Industry 4.0 and IoT continue to transform manufacturing, cybersecurity risks are evolving at an unprecedented pace. In this episode of 10 Questions to Cyber Resilience, Tom Molden, technology executive at Tanium, joins Luigi Tiano, co-founder of Assurance IT, to discuss the key challenges and solutions for manufacturing cybersecurity.

Key Takeaways:

🔄 IT & OT Convergence – Why collaboration between IT and manufacturing engineering teams is essential.
👥 Cultural Collaboration – Breaking down silos to foster security-first thinking.
🔎 Comprehensive Visibility – The importance of real-time monitoring for all technology assets.
🛡️ Cyber Hygiene in Manufacturing – How patching and security best practices strengthen resilience.
🏭 Legacy Systems & Evolving Threats – Addressing security risks in aging manufacturing environments.
⚙️ Operational Efficiency Through IT & OT Integration – The hidden benefits of a unified approach.
🤖 AI in Manufacturing Security – How AI is shaping preventative maintenance strategies.

Resources:

🔗 Tom Molden on LinkedIn
🔗 Tanium
🔗 Luigi Tiano on LinkedIn
🔗 Assurance IT

About Tom Molden

Tom Molden is a seasoned technology executive with expertise in IT, strategy, finance, and operations. With an international background and a proven track record in business transformation, M&A, and cybersecurity, Tom has helped global enterprises and fast-growing mid-sized companies navigate the complexities of digital security in manufacturing.

About 10 Questions to Cyber Resilience

A bi-monthly podcast where IT leaders answer 10 key cybersecurity questions, helping businesses build cyber resilience. Subscribe for insights on emerging threats, best practices, and security innovations.

About Assurance IT

Since 2011, Assurance IT has helped mid-market businesses in Canada secure their data and improve cybersecurity. Their PPR Methodology—Prepare, Protect, and Recover—simplifies cybersecurity and compliance, making security more accessible and effective.

Featured Posts
Cyber Talk

Access monthly conversations with IT & Tech Leaders about the hottest cyber security topics in the industry.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.