
Sign up to save your podcasts
Or
🌐 Exploring OT Security Maturity: Insights from Industry Experts
In our recent OT Security Connect webinar, panellists Alexander Staves (Bridewell), Ric Derbyshire (Orange Cyberdefense), and Sam Maesschalck (Nexova Group) dove into the critical challenges and advancements shaping OT security today.
Key highlights included:
🔹 Realistic Threats to OT Environments – A review from Ric on historical attack data including the predominant source of OT impacts, IT driven OT ransomware attacks, the opportunity of mitigating against ransomware attacks and the frequency of specific OT specific attacks.
🔹 Adopting OT Security Standards & Regulations – Alex provided an overview of the regulatory landscape, highlighting the rapid expansion of standards, the complexity of IEC 62443, and the frequent updates that make compliance a challenging task for OT operators.
🔹 Implementing OT Security Controls – Sam outlined three pillars for OT security: robust asset management, practical network segmentation, and IT-OT collaboration. He stressed using specialised tools for asset visibility, designing segmentation that aligns with operational needs, and building IT-OT teams to reduce silos. Sam also advocated for security training that respects operational demands and recommended a 'Crawl, Walk, Run' approach—starting with essentials and layering advanced controls over time
Join the OT Security Connect community as we navigate the evolving OT security landscape, connecting leaders, practitioners, and researchers to build resilient systems.
Join our LinkedIn community here - https://www.linkedin.com/groups/13002294/
🌐 Exploring OT Security Maturity: Insights from Industry Experts
In our recent OT Security Connect webinar, panellists Alexander Staves (Bridewell), Ric Derbyshire (Orange Cyberdefense), and Sam Maesschalck (Nexova Group) dove into the critical challenges and advancements shaping OT security today.
Key highlights included:
🔹 Realistic Threats to OT Environments – A review from Ric on historical attack data including the predominant source of OT impacts, IT driven OT ransomware attacks, the opportunity of mitigating against ransomware attacks and the frequency of specific OT specific attacks.
🔹 Adopting OT Security Standards & Regulations – Alex provided an overview of the regulatory landscape, highlighting the rapid expansion of standards, the complexity of IEC 62443, and the frequent updates that make compliance a challenging task for OT operators.
🔹 Implementing OT Security Controls – Sam outlined three pillars for OT security: robust asset management, practical network segmentation, and IT-OT collaboration. He stressed using specialised tools for asset visibility, designing segmentation that aligns with operational needs, and building IT-OT teams to reduce silos. Sam also advocated for security training that respects operational demands and recommended a 'Crawl, Walk, Run' approach—starting with essentials and layering advanced controls over time
Join the OT Security Connect community as we navigate the evolving OT security landscape, connecting leaders, practitioners, and researchers to build resilient systems.
Join our LinkedIn community here - https://www.linkedin.com/groups/13002294/