Governance & Risk Management , Operational Technology (OT) , Video

Finding the Right Strategy for Implementing OT Security

Improve Cyber Hygiene by Spreading Awareness, Advises CISO Hitesh Mulani
Hitesh Mulani, CISO, Mahindra & Mahindra

OT and SCADA security must be designed around protecting system availability, understanding OT-specific protocols and blocking attacks that target legacy systems commonly used in OT environments. CISO Hitesh Mulani of Mahindra & Mahindra shares advice on implementing OT security.

Mulani, who along with his team developed and implemented the entire OT security framework at four large automotive and tractor plants, said that coordination is important to overcoming this mammoth challenge.

See Also: 5 Ways to Improve Asset Inventory and Management Using Ordr

"One of the most important aspects of OT security is the synergy between your manufacturing execution system teams and your security teams," he said.

Mulani, who received Information Security Media Group's Dynamic CISO Excellence Award in the Visionary CISO category, said he is focused on breaking down the myths of OT security.

"I've offered a lot of my peers an insight into our setup to walk them through our journey so that more of them can believe in it and invest in it," he said. "It doesn't matter if the rest of the world is not doing it. If you believe it's hygiene and will help upkeep production and provide security, it's important to do."

In this video interview with Information Security Media Group at ISMG's Dynamic CISO Excellence Awards and Conference, Mulani discusses:

  • How to put the latest security practices in place in an OT environment;
  • Why product sprawl is such a problem and how to address it;
  • The best strategy for creating a skills development program.

Mulani heads the entire cybersecurity and privacy function at the Mahindra Group of companies, except for Tech Mahindra. He is responsible for reviewing the business strategies of each of the existing and emerging companies and ensuring the rollout of the right set of processes and technologies to protect their environments. Mulani has over two decades of experience in managing information security and has been at Mahindra & Mahindra for over four years. Previously, he worked at other firms including Yes Bank, Ernst & Young, and Bennett Coleman and Co. Ltd.


About the Author

Prajeet Nair

Prajeet Nair

Assistant Editor, Global News Desk, ISMG

Nair previously worked at TechCircle, IDG, Times Group and other publications, where he reported on developments in enterprise technology, digital transformation and other issues.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.