Archive for tag: OT

Incident Response in IT and OT Are Two Very Different Things

Think about it – your OT environment has already been breached. But what does that really mean? Today, you can’t read a news story or blog without learning about yet another breach of some sort. But a...

Assessment Methodology in OT: How Standards Can Help You Get Started

When tasked with assessing OT cybersecurity risk in OT, many CISOs have questions about methodology. Numerous standards exist, including NIST CSF, NERC CIP, NIST 800-53, with newer ones appearing regu...

Connected OT: The Next Headache for CISOs

The practice of risk management is quite mature in modern organizations. Many, if not most, CISOs have successfully applied corporate risk-management methodology to improve IT cybersecurity in a cost-...