FAQ Category: Consulting and Enablement

What is ‘Defense in Depth’ and how does it apply to OT?

Industrial control systems (ICSs) are an integral part of critical infrastructures, helping to facilitate operations in vital industries such as electricity, oil and gas, water, transportation, manufacturing, and chemical manufacturing. The growing issue of cybersecurity and its impact on ICS highlights fundamental risks to the Nation’s critical infrastructure. Efficiently addressing ICS cybersecurity issues requires a […]

Read More

What is an OT Cybersecurity Strategy?

The OT cybersecurity strategy: Refines and supplements guidance from the organization-wide risk management strategy to address OT-specific constraints and requirements; Identifies the OT cybersecurity team and personnel; Addresses the OT cybersecurity operation model (e.g., insource, outsource, and/or use managed security services); Outlines the appropriate cybersecurity architecture for the various OT sites within the OT program; […]

Read More

What impacts can an OT cyberattack have on your organization?

A strong OT cybersecurity program is fundamental to a sustainable business operation and can potentially enhance system reliability and availability. This includes minimizing unintentional OT system information security impacts from inappropriate testing, policies, and misconfigured systems. Cyber-attacks can also have other significant impacts, such as: Physical impacts – Including personal injury and the loss of […]

Read More