<img src="https://ad.doubleclick.net/ddm/activity/src=9826842;type=pagev0;cat=allsi0;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ord=1?" width="1" height="1" alt="">
  • On-Demand Webinar

    PrivSec Global Panel: OT and IT - Differences, Controls, and Key Integration Points

    Original Air Date: 11/29/2022

    We all know IT - the laptops, phones, applications, and cloud applications we use at work and home, that manage information. Systems that run industrial systems – electric utilities, gas pipelines, water systems, and manufacturing plants – are Operational Technology (OT).

    OT cyber protection has many differences from IT – different systems, threats, requirements for managing vulnerabilities, and especially implications of a significant incident. Cyber incidents often require close coordination of IT and OT security domains. 

    During this session, we’ll explore some of the unique characteristics of OT environments, critical controls for OT cyber security, and key integration points between IT and OT security that streamline investigations and incident resolution.

    Dragos_Icons_Gradient_ThreatAnalytics

    FREE GUIDE

    5 Critical Controls for World-Class OT Cybersecurity

    Learn how to align your organization and implement a successful OT security posture. Download this free guide and discover the key components of a world-class OT cybersecurity program.

    DOWNLOAD NOW
    Dragos_Icons_Gradient_ThreatAnalytics

    FREE WHITEPAPER

    IT Threats Impacting Operational Technology (OT) Infrastructure

    Download this whitepaper to gain greater insight into how IT threats can impact OT operations for better cybersecurity alignment between IT operations teams and OT engineers.

    DOWNLOAD NOW

    See the Dragos Platform in Action