Top 10 List for Securing Your IT/OT Environment


Posted on in Presentations

US-CERT’s most recent statistics show manufacturing as the most targeted sector, accounting for 22 percent of all cyberattacks. ICS attacks use multiple vectors: compromise IT and move into OT, compromise OT directly, insider threats and supply chain. A holistic security strategy for converged IT and OT is imperative. Use this Top 10 list from leading CISOs to benchmark your IT/OT security strategy.

Pre-Requisites: Basic understanding of operational technology as well as the high level concepts covered in the NIST CSF.


Participants
Dawn Cappelli

VP Global Security and Chief Information Security Officer, Rockwell Automation

Roy Gundy

Head of OT Cyber Security, Johnson & Johnson

Technology Infrastructure & Operations

operational technology (OT Security) infrastructure security critical infrastructure


Topic

Subtopic


Share With Your Community