The “Forgotten” OT/ICS Endpoints – How to Demonstrate Measurable Improvement in OT/IC Security

Presented by CEO John Livingston during SANS Industrial Forum

Firewalls are easy to misconfigure. While the security consequences of such errors may be acceptable for some firewalls connecting data and information networks, the accumulated risks of misconfigured firewalls in a defense-in-depth OT network architecture are generally unacceptable.

We explore eight common mistakes that firewall administrators make and describe how these mistakes can compromise ICS network security. The lesson here though is not ‘stop making mistakes.’ The lesson is to choose the appropriate technology for the need. We explore technology alternatives to OT firewalls that eliminate the potential for online attacks as a result of misconfiguration.

Contact Us

Connect with one of Verve's OT/ICS cyber security specialists to learn more about protecting endpoints in your environment.

Let's Chat

Related Resources

Video

Taking Security Directly to the Endpoint

There is no shortage of security solutions that aim to protect the perimeter, the network and to provide alerting and monitoring. What is sorely missing, however, is significant risk reduction on the endpoints themselves.  This has traditionally been due to ‘poorly fitting’ security tools, gaps in traditional IT security tools, and the inability to scale what is usually a manual…

Learn More
Blog

Risk Management for OT Endpoint Security: 5 Steps for Success

How to take a true endpoint security risk management approach for successful cyber defense efforts. This approach provides an OT-specific way of conducting ITSM.

Learn More
Blog

Managing ICS Endpoint Security During COVID-19

4 steps for greater OT endpoint protection during the novel coronavirus pandemic

Learn More