2020 Gartner OT Security Best Practices

As more and more Operational Technology (OT) devices are connected to IT networks for improved operational efficiency, the risk of cyber attack increases. For evidence, just look at what NotPetya, Industroyer, and Triton malware have done to several large manufacturing organizations.

Read this Gartner report and learn:

  • How OT and IT convergence raises new security challenges
  • Why network segmentation by itself can’t protect you
  • Best practices to protect OT environments from cyber attack

Gartner, OT Security Best Practices, Ruggero Contu and Lawrence Orans, 5 March 2020

Gartner is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.