2020 Gartner OT Security Best Practices
As more and more Operational Technology (OT) devices are connected to IT networks for improved operational efficiency, the risk of cyber attack increases. For evidence, just look at what NotPetya, Industroyer, and Triton malware have done to several large manufacturing organizations.
Read this Gartner report and learn:
- How OT and IT convergence raises new security challenges
- Why network segmentation by itself can’t protect you
- Best practices to protect OT environments from cyber attack
Gartner, OT Security Best Practices, Ruggero Contu and Lawrence Orans, 5 March 2020
Gartner is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.