Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesSecurity Leadership and ManagementSecurity Education & Training

4 steps to defend against cyber attack risk

By Jeff Zindel
cyber attack
August 24, 2023

Today, there is a tremendous amount of work being done to protect IT systems against cybercrime. Worryingly, the same cannot be said for OT, the operational technology systems that are used to run everything from factories to oil pipelines to power plants.

Organizations should be fortifying their cybersecurity strategies because threats targeting OT assets and operations are quickly increasing in volume and sophistication. At the same time, cybersecurity measures that are commonly deployed to protect IT — such as patching and antivirus management, secure file transfer, continuous monitoring, threat detection and response and network hardening — are sometimes conspicuously absent in the OT realm.

Often, there is neither adequate visibility nor understanding of the growing OT cybersecurity risk at the enterprise or site level. Worse still, there is a significant shortage in the OT space of cybersecurity professionals with required domain expertise. 

How did we get here? Part of the challenge is that OT networks and operations were thought of by many as being safe from cybersecurity threats. Historically, they were viewed as being air-gapped and isolated from external connectivity including the Internet and corporate IT networks⁠. This misconception provided many with a false sense of security. OT networks and assets are subject to malware that can be accidentally or purposely introduced in the OT environment via employees, contractors and vendors bringing laptops, tablets, as well as network and USB connected devices on site. The increasing use of remote access for OT operations, maintenance and support as well as the deployment of Internet of Things (IoT) devices and networks further increases the attack vectors and risks. In some cases, operators have yet to fully segment and secure OT networks from IT networks.

The OT cyberattack surface is expanding and adversaries are increasingly finding ways to attack it, devising clever ways to introduce malware, access backdoors and establish remote connectivity, which enables them to sneak inside OT systems and wreak havoc.

In short, OT cybersecurity risks are now enormous — and so are the consequences. Cyber incidents can lead to production loss, product-quality issues, damage to the environment, plant explosions, damage to brand and reputation, and even loss of life. Chillingly, Gartner predicts that by 2025, cyberattackers may be able to weaponize OT systems to harm or kill people. It further predicts that CEOs could be held personally liable for fatal incidents.

So what can be done? Here are four ways organizations can better protect their operational technology against cyberattacks.

1: Assess OT cybersecurity posture and risks

First and foremost, organizations need to gain an understanding of the security status or posture of their OT assets, networks, policies, procedures, practices and systems in place. An OT cybersecurity assessment conducted by reputable OT cyber professional is a great way to start. This assessment should inventory OT assets, classify the assets by primary function, map the network connections and traffic flows between the assets as well as prioritize the criticality of these assets and connections. It should identify vulnerabilities that exist in the OT environment and assess the risk of these vulnerabilities, identifying the severity of each. Finally, it should identify the efficacy of security controls including policies, procedures and technology.

Once you’ve conducted the OT cybersecurity assessment(s), you’ll have a better picture of the identified vulnerabilities and risks within your OT environment and the status of security controls. Organizations need to have ongoing visibility of their OT assets, networks and vulnerabilities, and software solutions can be leveraged to help provide it.

2: Build a program around OT cybersecurity like safety 

Organizations should approach OT cybersecurity as a program, just as they do safety in the industrial space or IT security in the corporate space. Using findings from the cybersecurity assessments, leaders can identify potential gaps in the organization’s approach to managing risks. Then they can begin to address capability gaps, clearly define cybersecurity policies required and determine responsibilities for mitigating risks. OT cybersecurity needs to be embraced at the highest levels of the organization. What’s more, much like how safety is treated, cybersecurity needs to be maintained as an ongoing program and regarded as a key operational enabler for the business.

Baked into that program should be well-defined OT cybersecurity governance, along with policies and procedures, dedicated resources and budgets, and roles, responsibilities and decision rights. A plan should be implemented to continuously measure and report cybersecurity risks. Organizations should establish remediation steps and policies to address these risks. Also, the creation of an incident response plan can help to formalize procedures to respond to cybersecurity incidents. 

Lastly, leadership should build a team of cybersecurity specialists that are trained to successfully manage and respond to threats. Having the right specialized OT cybersecurity talent is important, so some organizations may need to decide which roles will be handled in-house while other roles are outsourced. Some companies are purchasing external managed security services, which are end-to-end security-as-a-service solutions, to help protect OT environments, control systems and operations by identifying and mitigating emerging cyber threats to their business.

3: Implement the right OT cybersecurity tools and technology 

It is critical for organizations to leverage technology solutions to make cybersecurity operations more effective and efficient. Top of the list is ensuring that you have implemented appropriate security measures and controls for your network architecture controlling communication and for access to the OT environment for internal and external users and systems.

Fundamental technical security controls should be in place. Network and endpoint hardening should be implemented to reduce vulnerabilities and a best practice is to use technology to continuously monitor configurations for compliance. Organizations should have appropriate security for any remote access solution specific for OT. The solution should include advanced authentication, granular permissions per asset/system, data/time and actions allowed along with full traceability and auditing of who accesses company assets. Technology to support asset discovery and inventory can be used to increase visibility. And endpoint and network protection can be strengthened with technologies including USB protection to address this major risk and next-generation firewalls.

Patching and anti-virus management are essential technologies to minimize vulnerabilities. Many companies struggle with patching assets in their facilities, sometimes due to very limited opportunities to apply patches and reboot systems due to continuous operations and in other cases due to outdated and unsupported software. Compensating security controls including application control that allows only known and trusted applications to run on OT assets can be deployed to address these challenges.

4. Establish early detection and response strategy

Cybersecurity leaders must ensure that their organizations have solutions in place for ongoing, automated threat detection coupled with incident response. This requires continuous monitoring of OT assets and process control networks so that anomalous behavior, actions and changes are identified in near real-time. By using software solutions, indicators of compromise (IOCs) can be identified quickly and actions taken to mitigate risks before they become major incidents. 

In addition to automated threat detection and continuous monitoring, organizations should have rapid response processes and resources in place to move quickly to address incidents. Proper backup policies should be in place to rapidly respond and recover after a cybersecurity event. In some cases, a response may require that internal cybersecurity personnel are supplemented with external experts so that the organization is best positioned to respond effectively to incidents. 

As OT and IT systems continue to converge, the threat of cyberattacks will increase. But defending OT environments from cyber incidents will require a different set of strategies, skills and tools than are currently used to protect IT. The good news is that the world is finally waking up to the OT risk and realizing the need to strengthen OT cybersecurity — significantly and urgently.

KEYWORDS: cyber attack IoT Security operational security vulnerability

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zindel

Jeff Zindel serves as vice president and general manager of the cybersecurity business at Honeywell Connected Enterprise.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC_Web_5Minutes Mattson

    How organizations can defend against the increasing API attack surface

    See More
  • cloud-computing-freepik

    4 steps to protect your data against disaster in the cloud

    See More
  • convergence freepik

    4 steps to prepare for a ransomware attack: A C-suite guide

    See More

Events

View AllSubmit An Event
  • August 27, 2025

    Risk Mitigation as a Competitive Edge

    In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.
  • November 17, 2025

    SECURITY 500 Conference

    This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!