How to Protect OT the OT Way
Course
Maurice Snoeren examines distinct approaches for protecting OT systems and interfaces, demonstrating effective security strategies for critical control and safety systems.
In the dynamic landscape of digital transformation, the convergence of information technology (IT) and operational technology (OT) has emerged as an important strategy. However, these traditionally distinct domains present unique challenges. The cloud strategy of OT suppliers raises the question of whether OT systems should be connected to cloud infrastructures. These connections are often established using conventional IT methods, employing firewalls, routers, switches, VPNs, web services and virtualization to safeguard OT.
However, OT environments operate differently. They rely on process automation and safety systems to monitor and control real-world processes. The associated (cyber) risks significantly diverge from those in IT. Therefore, protecting OT systems demands a distinct approach: the OT way! The session will delve into the critical aspects of protecting OT systems and their interfaces and an example that demonstrates effective protection strategies to enhance security, particularly in critical control and safety systems.
Here is the course outline:
How to Protect OT the OT Way |