Posted by: kurtsh | June 25, 2021

INFO: Best Practices for Mitigating OT security threats

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats.  We recently published a security conversation with ICS/OT authority, Chris Sistrunk:

imageIn the latest Voice of the Community blog series post, Microsoft Product Marketing Manager Natalia Godyla talks with Chris Sistrunk, Technical Manager in Mandiant’s ICS/OT Consulting practice and former engineer at Entergy, where he was a subject matter expert on transmission and distribution of supervisory control and data acquisition (SCADA) systems. In this blog, Chris shares best practices to help mitigate the security threats to operational technology (OT) environments.

In this blog, Chris Sistrunk answers questions such as:

  • What tools do you use to monitor and govern your OT environment?
  • What are some best practices for securing remote access to the OT network?
  • What percentage of organizations are continuously monitoring their OT networks?
  • How can teams break down IT and OT silos?
  • What should roles and responsibilities look like?
  • Should companies unify IT and OT security in the security operations center (SOC)?
  • What would you say to a board of directors to get them to prioritize OT security?

Read the full discussion and blog here:


%d bloggers like this: