Implementing effective OT security posture

Written by
Jun 8, 2022 | CYBERSCOOP

Operational technology (OT) has long been part of a technology environment that functions apart from most enterprise IT operations. That has led to communication challenges, misalignment with IT strategies and uncertainty on how to develop OT cybersecurity strategies.

To protect the enterprise as a whole, IT and OT must work together. However, implementing and adopting cybersecurity controls first requires building a solid technical foundation with executive endorsement, says a new Dragos guide.

The guide “5 Critical Controls for World-Class OT Cybersecurity” details why it’s essential to have leadership educated and aligned on the risks of OT security and the differences between IT and OT. “Help them understand that the organization has been focused on reducing IT cyber risk while under-serving OT – the side of the house that actually generates revenue – and that it’s now time to course correct,” the guide stresses.

The guide highlights five key controls to implement now to better secure OT environments, including:

An ICS-specific incident response planDefensible architectureOT visibility: asset inventory, vulnerability mapping and monitoringMulti-factor authenticationKey vulnerability management

Read the guide to learn more about ensuring the success of ICS/OT security initiatives.

This article

Read More: https://www.cyberscoop.com/implementing-effective-ot-security-posture/