13 Ways to Improve OT Security

August 25, 2023

Operational technology (OT) made numerous cybersecurity headlines in 2022 and remains a favorite target for threat actors in 2023. OT security incidents can impair business-critical operations, disrupt essential services, and even threaten public health and safety.

Yet, despite the headlines, most OT systems are still not engineered nor operated with a security-first mindset. These systems are typically beyond the purview and control of security-conscious CISOs and CIOs – being designed, procured, and managed by engineering organizations that are primarily focused on meeting key business performance objectives related to system uptime and efficiency. 

Join CyberArk and PwC for a fireside chat covering best practices for strengthening OT security and improving cyber readiness, including:  

  • Championing a defense-in-depth approach to security  
  • Isolating the OT network
  • Securing privileged access for vendor, contractors, and remote employees
  • Removing hard-coded OT device credentials from applications and scripts 

Speakers:  
David Higgins, Senior Director, Field Technology Office, CyberArk  
Lukáš Pavka, Lead Architect – Senior Manager, PwC  
Robert Sawyer, Senior Director, DevSecOps Solutions Marketing, CyberArk

Previous Article
How CyberArk Endpoint Privilege Manager Aligns with the MITRE ATT&CK Framework
How CyberArk Endpoint Privilege Manager Aligns with the MITRE ATT&CK Framework

Learn about the capabilities of CyberArk Endpoint Privilege Manager (EPM) in the context of the MITRE ATT&C...

Next Article
3 Types of Privileged Accounts to Secure in a Transforming Enterprise
3 Types of Privileged Accounts to Secure in a Transforming Enterprise

For security teams managing their enterprises’ privileged access management (PAM) programs, times have chan...