Frequently Asked Questions
Home » Frequently Asked Questions
What’s the Difference Between Commercial and Industrial Cybersecurity?
An OT cybersecurity audit is typically the complete inventory, documentation and assessment of OT system assets installed within a specified environment. Traditionally this has included …
What is the CIA Model for Cybersecurity?
The CIA trio is a security model (a.k.a. AIC triad to avoid confusion with the Central Intelligence Agency). Confidentiality, Integrity, Availability. Confidentiality means that data …
What is an OT cybersecurity audit?
An OT cybersecurity audit is typically the complete inventory, documentation and assessment of OT system assets installed within a specified environment. Traditionally this has included …
What size companies should have an OT cybersecurity plan?
Protecting your environment is not dependent on company size or revenue. Hackers are not discriminant based solely on company size; some are for personal gain …
What is industrial control system cybersecurity?
Industrial control Systems (ICS) is a generic term utilized for all control systems, devices, instrumentation, networks, and processes that are utilized for automating, managing, monitoring …
What are the security priorities of OT cybersecurity?
The IT world has long utilized the CIA Triad (Confidentiality, Integrity, Availability) as the foundation for cybersecurity Confidentiality as its first objective. The OT cybersecurity …
What is OT ICS SCADA?
We must first look at the acronyms to understand this question. OT stands for Operational Technology; in other words, the technical components that make up …
What are some typical OT Devices?
Typical OT Devices include distributed control systems (DCSs), programmable logic controllers (PLCs), supervisory control and data acquisition systems (SCADA), safety instrumented systems (SIS), process instrumentation, …
What is Supervisory Control and Data Acquisition (SCADA)?
SCADA is an acronym describing components that interface with the process or manufacturing controls for an organization. Systems architecture components associated include computers, networks, communication …
What are common challenges in OT Cybersecurity?
While IT and OT networks and operations have merged over the years, each cannot be treated in the same fashion. The CIA Triad commonly utilized …
Should an OT Cybersecurity Program be managed in-house or externally?
The best OT Cybersecurity program is one where a partnership is built between in-house personnel and outside experts versed both in OT Cybersecurity and your …
What types of businesses need OT Cybersecurity?
The Cybersecurity & Infrastructure Security Agency (CISA) has identified 16 sectors that form our critical infrastructure including energy, chemicals, healthcare, and critical manufacturing among others. …