From the course: Operational Technology (OT) Cybersecurity Essentials: Defending Critical Infrastructure
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Implementing OT cybersecurity best practices
From the course: Operational Technology (OT) Cybersecurity Essentials: Defending Critical Infrastructure
Implementing OT cybersecurity best practices
- [Instructor] Let's be real, OT cybersecurity isn't just an IT or operations problem, it's a national security issue, a public safety concern, and a business continuity challenge all rolled up into one. We've seen what these threat actors like Sandworm, Volt Typhoon, and the authors of Stuxnet can do. We know that ransomware can shut down pipelines, that insiders can sabotage critical systems, and that supply chain attacks can bring industrial operations to a halt. So the big question is, what do we do to fight back? In this video, we're taking a more proactive approach. We'll break down the top three best practices that can protect OT environments, helping organizations build resilience and stay ahead of attackers. OT systems weren't built with security in mind, but that doesn't mean they have to stay vulnerable. Let's break down the key best practices that every OT environment should be implementing yesterday. Let's start with network segmentation. If attackers breach an IT…