Frequently Asked Questions

Our team of cybersecurity experts continually research, challenge, and put into place strategies, documentation, and tools to meet local, corporate or global requirements for OT cyber security.

What is an OT cybersecurity audit?

An OT cybersecurity audit is typically the complete inventory, documentation and assessment of OT system assets installed within a specified environment.  Traditionally this has included …

Read More →

What size companies should have an OT cybersecurity plan?

Protecting your environment is not dependent on company size or revenue.  Hackers are not discriminant based solely on company size; some are for personal gain …

Read More →

What is industrial control system cybersecurity?

Industrial control Systems (ICS) is a generic term utilized for all control systems, devices, instrumentation, networks, and processes that are utilized for automating, managing, monitoring …

Read More →

What are the security priorities of OT cybersecurity?

The IT world has long utilized the CIA Triad (Confidentiality, Integrity, Availability) as the foundation for cybersecurity Confidentiality as its first objective. The OT cybersecurity …

Read More →

What is OT ICS SCADA?

We must first look at the acronyms to understand this question. OT stands for Operational Technology; in other words, the technical components that make up …

Read More →

What are some typical OT Devices?

Typical OT Devices include distributed control systems (DCSs), programmable logic controllers (PLCs), supervisory control and data acquisition systems (SCADA), safety instrumented systems (SIS), process instrumentation, …

Read More →

What is Supervisory Control and Data Acquisition (SCADA)?

SCADA is an acronym describing components that interface with the process or manufacturing controls for an organization.  Systems architecture components associated include computers, networks, communication …

Read More →

What are common challenges in OT Cybersecurity?

While IT and OT networks and operations have merged over the years, each cannot be treated in the same fashion. The CIA Triad commonly utilized …

Read More →

Should an OT Cybersecurity Program be managed in-house or externally?

The best OT Cybersecurity program is one where a partnership is built between in-house personnel and outside experts versed both in OT Cybersecurity and your …

Read More →

What types of businesses need OT Cybersecurity?

The Cybersecurity & Infrastructure Security Agency (CISA) has identified 16 sectors that form our critical infrastructure including energy, chemicals, healthcare, and critical manufacturing among others. …

Read More →
Scroll to Top