- The Lenovo laptop I recommend for hybrid workers is $1,000 off for October Prime Day
- Wi-Fi HaLow: Hands on with AsiaRF's IoT network gateway
- Best Prime Day gaming deals to shop in October 2024
- Learn Cybersecurity Essentials for Just $40 from Home
- Clickbait and Switch: How AI Makes Disinformation Go Viral | McAfee Blog
What’s your IoT/OT security profile? Answer 8 questions to improve your practice – Cisco Blogs
Cyber attacks are spreading beyond offices and data centers to industrial networks. Headlines like the attack on a Florida water treatment plant and Colonial Pipeline have captured the attention of executives and company boards concerned about uptime and safety. This risk applies across critical infrastructure operators and small industrial sites alike. Organizations of all sizes are now putting together tiger teams to implement the right IoT/OT cybersecurity measures.
Ready, set… now what?
Say you’re tasked to strengthen industrial cybersecurity. Where will you start? Guidance is hard to find. Operational technology (OT) team members typically don’t have deep expertise in cybersecurity, and information technology (IT) security experts usually aren’t familiar with the special requirements for industrial networks. For example, taking down an infected email server for an hour is an annoyance, while taking down an industrial controller in a manufacturing plant or a power substation can have dire consequences.
Clear guidance on best practices, tailored for your business
We’ve built an online tool to point you in the right direction for IoT/OT security. By answering eight simple questions, you can see how your company compares to your peers’ cyber security infrastructure and get custom recommendations for next steps. Recommendations include links to actual solutions for putting the practices in action. They’ll help you implement the NIST cybersecurity framework—identify, protect, detect, respond, and recover—in an industrial environment:
- Building a detailed inventory of the industrial devices you are defending
- Isolating the IT and OT domains, and also isolating the individual production cells (e.g., welding and painting)
- Building security policies for micro-segmentation and to protect individual assets by enforcing zones of trust in the industrial network
- Detecting anomalous behavior that could be a sign someone modified the configuration of an industrial controller
- Correlating information to investigate events across IT and OT domains
- Building playbooks to respond to attacks—and then testing your plans
- Much more
Securing industrial operations can be a daunting task. Planning is much easier with proper guidance, tailored for your situation. Build your OT/IoT security profile now.
To get the latest industry news on IoT Security delivered straight to your inbox, subscribe to the Cisco IoT Security Newsletter.
Share: