How to get started with OT security

0
138

In the last couple of years, OT security has managed to get plenty of attention from security teams. Some businesses have even started having dedicated teams to manage OT security and tools. However, many businesses are still in the process of figuring out a strategy to deal with OT threats and specific risks to infrastructure and networks. This article will shed some light on how to improve OT security without putting strain on your existing resources.

Where to start?

In a manufacturing plant in the APAC region that was attacked in May last year, security teams were unable to agree on which tool to choose for securing OT systems. This resulted in a prolonged delay in decision-making. The teams met over 22 times in 6 months without being able to come to a consensus on the way forward. 

In every meeting, the IT security team, the SCADA and ICT team, and the CISO’s nominee would discuss and agree to disagree on these points:

  • The IT team wanted to go with the existing vendor who was offering an untested and unproven solution for OT security for free
  • The SCADA team wanted to go for a proven OT solution but the CISO’s nominee was not comfortable with the budgets that were…

Read More…