Top 10 List for Securing Your IT/OT Environment

Posted on in Presentations

US-CERT’s most recent statistics show manufacturing as the most targeted sector, accounting for 22 percent of all cyberattacks. ICS attacks use multiple vectors: compromise IT and move into OT, compromise OT directly, insider threats and supply chain. A holistic security strategy for converged IT and OT is imperative. Use this Top 10 list from leading CISOs to benchmark your IT/OT security strategy.

Pre-Requisites: Basic understanding of operational technology as well as the high level concepts covered in the NIST CSF.

Dawn Cappelli


Director, OT-CERT, Dragos

Roy Gundy


Head of OT Cyber Security, Johnson & Johnson

Share With Your Community