Skip to main content

This guide is for IT security veterans who have a great understanding of well-worn cybersecurity concepts, principles, and lingo. We will not waste anyone’s time explaining what a firewall is or what exploitation means. 

Instead, this is a no-nonsense guide to operational technology (OT) terms and OT cybersecurity concepts for IT security pros who want to help their firms bolster the security around their critical infrastructure. This is a crib sheet for security practitioners who want to speak the language and understand the pain points of operational engineers as they’re trying to collaborate toward improved OT security posture. 

In addition to the glossary, the guide will provide some important concepts and tips for cyber veterans to hit the ground running as they scope an OT cyber risk management plan that makes sense for the business. 

You’ll learn:

  • What is OT Cybersecurity?
  • The #1 Difference in Security Objectives Between IT and OT
  • Common Stumbling Blocks for IT Cyber Pros to Avoid When Collaborating with OT Staff
  • Understanding OT Architecture Below the Enterprise Level
  • Using the SANS Five Critical Controls for ICS Cybersecurity as Your North Star
  • Reframing Common Cyber Terms and Concepts for ICS/OT
  • Cybersecurity Regulations & Standards Commonly Referenced in OT
Discover More Resources Using Keyword Tags
Cybersecurity Maturity OT Cyber Risk OT Cybersecurity

Discover more resources.

Explore more resources to support you on your ICS cybersecurity journey.

View next datasheet

datasheets

OT Watch Datasheet

View Datasheet
Right Arrow

View more datasheets

Right Arrow

Ready to put your insights into action?

Take the next steps and contact our team today.