Leveraging Industry Standards to Address OT Cybersecurity Challenges
Date
Wednesday, May 3, 2023
Time
11:00 AM - 12:00 PM (CDT)
Aasef Iqbal
Description

In recent years, the industrial automation and control systems/ industrial control systems/ operational technology (IACS/ICS/OT) on which much of our critical infrastructure (CI) and related industries depend, have frequently become the target of cyber-attacks. In part, this is a consequence of the inevitable convergence of operational technology with information technology (IT).
 
However, while the impact of a security breach on most IT is limited to a financial loss, the potential risk of destroying equipment, threatening national security, and even endangering human life also adds to ICS/OT attacks. With this critical distinction, there also comes numerous challenges when implementing security controls in the ICS/OT environments. Selection of the security controls is one challenge, while ongoing maintenance of these controls is another. One of the greatest challenges is the selection of the right security controls compliant with ICS/OT industry regulations, standards, and frameworks.
 
ICS/OT are complex environments and adding inadequately designed security controls within these environments can be ineffective in achieving the security objectives and could bring numerous challenges for ICS/OT asset owners and operators. A standards-based, defense-in-depth approach can be effective protecting and securing the most critical services and infrastructures, plus reduces the total cost of ownership (TCO) for security infrastructure without introducing operational complexities.
 
In this two-part webinar series, you’ll learn from Fortinet subject matter experts how an integrated security solution from Fortinet, designed for ICS/OT environments and standards-based defense-in-depth approach, can help organizations overcome their security challenges.

Learning Objectives | Part 1: Industry Standard Approaches to Address OT Cybersecurity Challenges

1.    Challenges affecting the security of OT environments
2.    Industry standard approaches to address OT cybersecurity challenges
3.    Standards-based cybersecurity architecture for OT
4.    Fortinet approach to OT cybersecurity