• Skip to primary navigation
  • Skip to main content
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint Security
      • Network Security
      • Cloud Security
      • Application Security
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

Arraya Insights Radio – Security & the Shop Floor: An Xs and Os Look at Manufacturing’s Digital Defenses

Arraya Insights Radio

Episode 3: Security & the Shop Floor: An Xs and Os Look at Manufacturing’s Digital Defenses

Host: Thomas York (Director, Quality and Operational Excellence & Dallas Cowboys Fan)

Guests: Tom Clerici (Director, Cyber Security Practice & NY Giants Fan) and Doug Guth (Director, Cisco and IoT Practice & Philadelphia Eagles Fan)

As the Department of Homeland Security’s annual Critical Infrastructure Security and Resilience Month comes to a close, the Arraya Insights Radio crew discusses the challenges facing modern manufacturers as they work to keep their data and their processes safe from cyber criminals looking to make a quick buck – or worse. Later, the conversation stays with cyber security, however, some longstanding NFC East rivalries begin to bubble to the surface.

Theme Music: “I Don’t Remember (Yesterday)” by Hygh Risque

Further Reading:

  • Fed Issues Cyber Security Warning for Critical Infrastructure Industries: 6 Ways to Respond, by Arraya Insights
  • 6 Proven Hacker-Repelling Ways for Manufacturers to Secure an ICS, by Arraya Insights
  • What the Equifax Breach Means for the Future of Securing Sensitive Data, by Tom Clerici
  • Manufacturing’s Top 6 Technology Challenges, by Arraya Insights
  • WannaCry Ransomware Goes Global: What to Do to Stay Safe, by Doug Guth
  • IT Leaders Share Their Most Painful Cyber Security Challenge, by Arraya Insights
Arraya Insights
Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}