Summary of Unilever’s Bobby Ford Discusses How to Secure Your Digital Business

Looking for the video?
We have the summary! Get the key insights in just 5 minutes.

Unilever’s Bobby Ford Discusses How to Secure Your Digital Business summary
Start getting smarter:
or see our plans

Rating

8

Qualities

  • Analytical
  • Applicable
  • Bold

Recommendation

COVID-19 restrictions produce additional headaches for operational technology (OT) and information technology (IT) managers of large digital networks. Unilever VP and CISO Bobby Ford and his team handle data at 300 manufacturing plants, which produce household brands such as Ben & Jerry’s, Hellmann’s, Lipton, Dove and Vaseline that are used daily by over 2 billion people. The Wall Street Journal’s David Uberti interviews the veteran cybersecurity expert about how Unilever monitors and protects its massive digital assets in pandemic times.

About the Speaker

Bobby Ford is vice president and chief information security officer at Unilever. David Uberti is a cybersecurity reporter for The Wall Street Journal.

 

Summary

Unilever CISO Bobby Ford recommends prioritizing cybersecurity threats according to individual company needs.

Ford identifies the two main threats as: 1) attacks on data designed to degrade or destroy it, and 2) attempts to impact or disrupt company operations. Because Unilever produces physical products at 300 manufacturing facilities, Ford prioritized operations over data.

Digital transformation, the heart of industry 4.0, addresses anticipating and exceeding consumer needs. “Democratizing the data” enables intelligence-driven decisions, but increased system functionality creates more vulnerabilities to attack. For example, today’s cell phones offer much more functionality than the phones of 50 years ago, but their added features make them less secure.

Ford developed a specific framework that allows Unilever to take necessary risks in moving products to consumers.

Ford established a dedicated team that travels to manufacturing facilities to assess their security networks. The team first creates an operational technology (OT) asset registry...


More on this topic

The Cybersecurity Playbook
8
Tools and Weapons
10
Imagination Is a Creative Superpower
9
The New Attack Surface is Your Life
9
Too Smart
10
Smart Cities For Dummies
8

Related Channels

Comment on this summary