2020 Gartner OT Security Best Practices

As more and more Operational Technology (OT) devices are connected to IT networks for improved operational efficiency, the risk of cyber attack increases. For evidence, just look at what NotPetya, Industroyer, and Triton malware have done to several large manufacturing organizations.

Read this Gartner report and learn:

  • How OT and IT convergence raises new security challenges
  • Why network segmentation by itself can’t protect you
  • Best practices to protect OT environments from cyber attack

Gartner, OT Security Best Practices, Ruggero Contu and Lawrence Orans, 5 March 2020

Gartner is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.

This content should open in a new browser tab, and a direct link was sent to the email address you provided. If this content doesn't open here, please check your browser's settings or click the direct link sent to your email.