Frequently Asked Questions

Our team of cybersecurity experts continually research, challenge, and put into place strategies, documentation, and tools to meet local, corporate or global requirements for OT cyber security.

What is the difference between Cybersecurity and OT Cybersecurity?

OT Cybersecurity protection manages data controls with physical concerns to a greater degree than its IT Cybersecurity counterpart is expected to accomplish. This is because …

Read More →

What are some typical OT Devices?

Typical OT Devices include distributed control systems (DCSs), programmable logic controllers (PLCs), supervisory control and data acquisition systems (SCADA), safety instrumented systems (SIS), process instrumentation, …

Read More →

What is Supervisory Control and Data Acquisition (SCADA)?

SCADA is an acronym describing components that interface with the process or manufacturing controls for an organization.  Systems architecture components associated include computers, networks, communication …

Read More →

What are common challenges in OT Cybersecurity?

While IT and OT networks and operations have merged over the years, each cannot be treated in the same fashion. The CIA Triad commonly utilized …

Read More →

Should an OT Cybersecurity Program be managed in-house or externally?

The best OT Cybersecurity program is one where a partnership is built between in-house personnel and outside experts versed both in OT Cybersecurity and your …

Read More →

What types of businesses need OT Cybersecurity?

The Cybersecurity & Infrastructure Security Agency (CISA) has identified 16 sectors that form our critical infrastructure including energy, chemicals, healthcare, and critical manufacturing among others. …

Read More →