Security for Operational Technology Environments
Facebook Twitter LinkedIn
Blog Post

Security for Operational Technology Environments

John Tolbert
Published on Sep 05, 2022

Operational Technology (OT) systems encompass Industrial Control Systems (ICS), Critical Infrastructure Systems (CIS), and Industrial Internet of Things (IIoT). OT environments face threats similar to those that traditional enterprise IT systems do, as well as threats unique to each type and implementation. 

ICS environments are those found in manufacturing facilities and warehouses, and may involve dedicated Human-to-Machine Interfaces (HMIs), Programmable Logic Controllers (PLCs), sensors, valves, actuators, etc. Critical Infrastructure includes regional and municipal power plants and distribution grids, water treatment plants, traffic and navigation systems, etc. IIoT devices include various sensor types, cameras, and other IP-enabled devices. Though the settings in which these systems operate and the equipment types comprising OT environments are diverse, the consequences of cyber-attacks can often be more severe than attacks against isolated corporate targets.  

Real-life examples 

Ransomware attacks against manufacturing plants have set back production not only in their facilities but throughout other members of their supply chains. Ransomware incidents have halted overland and overseas shipments for weeks while IT teams scramble to eliminate the malware and restore from backups so that businesses can get back up and running. Cyber-attacks against power generation facilities have turned out the lights temporarily in some cases. Ransomware attacks on hospitals and other medical facilities threaten not only patient data but lives. Even compromises of enterprise IT systems at companies running OT can have severe impacts for those companies and national economies.  

Key components for securing industrial environments 

It is clear that the risks of OT compromise extend far beyond the organizations that are initially impacted. KuppingerCole recently published a Market Compass on Industrial Controls Security. We identify several key components for securing these environments: 

At the KuppingerCole Cybersecurity Leadership Summit, we’ll address topics pertinent to OT security. We’ll have a track on Building Resilience, a session on Zero Trust for OT, security in the energy sector, endpoint security for ransomware prevention and mitigation, securing data in IoT realms, and strategic approaches to securing ICS environments.


Hybrid Ticket
Full conference
till October 8th
Whole conference (Nov 08-10, 2022)
Attend on-site or join virtually
Join networking events and visit the expo area
Watch all sessions live or on-demand
Enter the event platform and chat with virtual participants
Access presentation slides
Virtual Ticket
Maximum virtual experience
till October 8th
Whole virtual conference (Nov 08-10, 2022)
Watch all sessions live or on-demand
Enter the event platform and chat with virtual participants
Access presentation slides
Explorer Pass
Day 1 for free
Join virtually for free on Day 1 (8 November 2022)
Participate in workshops
Enter the event platform and chat with virtual participants
Get to know CSLS
Access to days 2 and 3
Have you participated in our events?
Contact us to get a special discount
Other ways to attend
Young Talents -
student program
Register and apply
Journalists &
Confirm press accreditation
Subscribe for updates
Please provide your email address