best practices and tools for ot and it security

In the past, information technology (IT) and operations technology (OT) systems operated independently, but that has changed. As demonstrated by the Colonial Pipeline attack, IT vulnerabilities can now have a significant impact on OT, and vice versa. Since OT environments pose unique challenges, the security approaches that are effective for IT may not be suitable for OT. In this webinar, industry experts will delineate the distinct requirements for securing IT and OT, while providing best practices and strategies for safeguarding OT systems. The focus will be on protecting OT, ensuring that even if the IT network is compromised, the OT systems remain secure.

During this live webinar, you will:

  • Gain insights into the growing integration of OT and IT security across various sectors.
  • Understand the fundamental differences between securing OT networks compared to IT networks.
  • Discover best practices to maintain the operational integrity of OT networks, even in the event of IT network compromises.

Featured speakers for the event are Tom Parker and Ron Fabela, and the webinar will be moderated by Becky Bracken.

Best Practices and Tools for OT and IT Security

DarkReading
On-demand
Unknown




    Continue
    Your personal data will be used only for cybersecurity related email campaigns (webinars, cybersec info & various offers related to your field of interest). You may opt out at any time by clicking here: Unsubscribe