We’re All Two Hops from the Internet: Rethinking the OT Security Approach
When connected devices and sensors run from the pipeline to IP phone or the drill rig to the board room, we can no longer remain focused on the OT device alone in our security strategy. Attackers see one large enterprise, with many possible attack vectors and pivot points. Security teams today need the ability to monitor all vectors and all devices that might be used as part of an industrial attack kill chain.
Join Nathan Singleton, Manager of Cybersecurity at Helmerich & Payne, and Curtis Simpson, Chief Information Security Officer at Armis, as they discuss the security challenges faced by modern industrial enterprises, the areas of exposure, and the changes needed to protect the modern OT environment.