OT Cybersecurity Quick Start Guide for IT Professionals.
This guide is for IT security veterans who have a great understanding of well-worn cybersecurity concepts, principles, and lingo. We will not waste anyone’s time explaining what a firewall is or what exploitation means.
Instead, this is a no-nonsense guide to operational technology (OT) terms and OT cybersecurity concepts for IT security pros who want to help their firms bolster the security around their critical infrastructure. This is a crib sheet for security practitioners who want to speak the language and understand the pain points of operational engineers as they’re trying to collaborate toward improved OT security posture.
In addition to the glossary, the guide will provide some important concepts and tips for cyber veterans to hit the ground running as they scope an OT cyber risk management plan that makes sense for the business.
You’ll learn:
- What is OT Cybersecurity?
- The #1 Difference in Security Objectives Between IT and OT
- Common Stumbling Blocks for IT Cyber Pros to Avoid When Collaborating with OT Staff
- Understanding OT Architecture Below the Enterprise Level
- Using the SANS Five Critical Controls for ICS Cybersecurity as Your North Star
- Reframing Common Cyber Terms and Concepts for ICS/OT
- Cybersecurity Regulations & Standards Commonly Referenced in OT
Discover more resources.
Explore more resources to support you on your ICS cybersecurity journey.
See the Dragos Platform in Action
Take the next step to protect your OT environment now with a free demo