We all know IT - the laptops, phones, applications, and cloud applications we use at work and home, that manage information. Systems that run industrial systems – electric utilities, gas pipelines, water systems, and manufacturing plants – are Operational Technology (OT).
We all know IT - the laptops, phones, applications, and cloud applications we use at work and home, that manage information. Systems that run industrial systems – electric utilities, gas pipelines, water systems, and manufacturing plants – are Operational Technology (OT).
OT cyber protection has many differences from IT – different systems, threats, requirements for managing vulnerabilities, and especially implications of a significant incident. Cyber incidents often require close coordination of IT and OT security domains.
During this session, we’ll explore some of the unique characteristics of OT environments, critical controls for OT cyber security, and key integration points between IT and OT security that streamline investigations and incident resolution.