>> No. >> No?
>> No, more features typically what'd you
do and this is interesting.
I think there's interesting economics here.
We all use the computers that have a lot of hardening,
security hardening in the OS and even in the hardware.
When you make industrial hardware, you're so concerned about incredible reliability.
Computer, you reboot it if it hiccups.
And industrial machine like a PLC, you put it in and
you expect it to run flawlessly for 20 years regardless of the environment.
So tremendous amount of physical engineering goes into those devices to
make them highly reliable and
that precludes because you don't have the economics.
You don't have the dollars and
you don't have the compute power to put any hardening on them.
>> Yeah, makes sense.
>> Now you will hear expert people in cyber security say,
The way to solve the industrial security problem is to harden the devices.
It's a lot of good reasons, and that's one that's not going to happen.
>> You know one thing I've heard people say and
tell me what you think about this, they say.
It's like aphorism and security that people are the real problem.
>> Yeah. >> And
then if that were true then you'd say,
my gosh, industrial should be easy- >> Yeah.
>> User devices, there's no people- >> Yeah.
>> What do you think about that?
>> Here's what I think, and you're right.
The biggest vulnerabilities in cyber and
you know this as well as anybody in the world All right?
Come from people who, variety of reasons are.
>> Yeah. >> You know, they click on the wrong
link in the email.
>> Yeah. >> That's your aperture,
that's the way in for a bad guy.
>> Wow. >> Once he's in,
he can do all kinds of incredible things.
And the convergence boundary between the IT space and
the OT space is generally unprotected.
It`s not a perimeter.
You will usually not find firewalls there, although people are thinking this through.
What you really need to do,
to your point directly, because that was an insightful session, I thought,