Top 10 List for Securing Your IT/OT Environment

Posted on in Presentations

US-CERT’s most recent statistics show manufacturing as the most targeted sector, accounting for 22 percent of all cyberattacks. ICS attacks use multiple vectors: compromise IT and move into OT, compromise OT directly, insider threats and supply chain. A holistic security strategy for converged IT and OT is imperative. Use this Top 10 list from leading CISOs to benchmark your IT/OT security strategy.

Pre-Requisites: Basic understanding of operational technology as well as the high level concepts covered in the NIST CSF.

Interested? We have you covered! This popular session will also be streamed live in The Session Viewing Point, West Level 2 Room 2004.

Dawn Cappelli


VP Global Security and Chief Information Security Officer, Rockwell Automation

Roy Gundy


Head of OT Cyber Security, Johnson & Johnson

Technology Infrastructure & Operations

operational technology (OT Security) infrastructure security critical infrastructure



Share With Your Community