5 OT security takeaways CISOs need to communicate to stakeholders

Now that executives are (a little) comfortable with IT security, it's time to preach the gospel of operational technology security.

Operational technology (OT) is Gartner's wide-ranging word for internet-connected industrial stuff, including industrial control systems (ICS) and supervisory control and data acquisition (SCADA) largely found in manufacturing and public utilities such as water treatment facilities and the energy grid. 

Cyber attacks on OT can be devastating. When the NotPetya faux-ransomware was done with shipping giant Maersk, the company had suffered $300 million in losses — and it could have been a lot worse. Maersk was nothing more than collateral damage in the hacking war between Russia and Ukraine. Similar incidents seem almost certain to occur again in the future to other enterprises.

Protecting your enterprise from data breaches is a hard problem, but protecting your manufacturing equipment from cybersecurity threats is even harder. Negative consequences can range from extended downtime and lost productivity to machinery exploding on the factory floor.

How does a CSO break down these risks for other executives, not to mention the board of directors? Here are the top five OT security takeaways.

To continue reading this article register now

Get the best of CSO ... delivered. Sign up for our FREE email newsletters!