Selecting Cybersecurity Solutions for OT Environments
Course
Mary Sebastin of Honeywell delivers a practical framework for evaluating and selecting OT cybersecurity solutions - balancing technical rigor, operational constraints and risk-based priorities.
Selecting the right cybersecurity solution for OT is not a procurement exercise; it is a strategic discipline shaped by competing priorities, legacy constraints and operational risk. IT-grade tools cannot simply be transplanted into environments where availability and safety outrank confidentiality.
In this session, led by Mary Sebastin of Honeywell, you will learn:
- How to approach solution selection using a risk-based framework, defining must-haves before engaging vendors and matching tools to assessed risk rather than feature lists;
- What the science of evaluation covers: architecture compatibility, performance and latency, resilience and fail-safe behavior, and agent coexistence in live OT systems;
- How to build a defensible architecture through defense-in-depth, network segmentation, zero trust principles and effective training to ensure tools remain operationally sound.
Here is the course outline:
The Art and Science of Selecting Cybersecurity Solutions for OT Environments |