The maturity level of IT security has evolved over the past 25 years. Through this evolution, IT shops have many tools deployed to help detect, Identify and mitigate their Cyber Security threats. However, the OT (Operational Technology) side of most organizations for the most part, are still in the stone age. This is mostly due to the fact, that IT tools can't communicate with OT devices. In the past and still today, the fear of shutting down a manufacturing assembly line has kept IT security tools out of the OT networks. With the need for more real time production data, OT networks are moving from being Air gapped to internet enabled making them easy targets for hackers. IT teams are being challenged with securing the OT networks which require visibility into these networked devices and controls to monitor any changes.
We will discuss how to go about solving this dilemma and what are the top 3 items a security manager should look for when taking the first step in securing OT networks.