OT Security: Security for Operational Technology

No industrial production without Operational Technology (OT). But OT plays by its own rules: OT security poses a particular challenge for IT security managers.
Our topic page guides you through the jungle of OT security and summarises the relevant offerings at it-sa 365.

default Stage Background
Robot arm with industrial employee

OT Security: Security for Operational Technology

No industrial production without Operational Technology (OT). But OT plays by its own rules: OT security poses a particular challenge for IT security managers.
Our topic page guides you through the jungle of OT security and summarises the relevant offerings at it-sa 365.

Why OT security has its own rules

  • Production is the basis of the economy: everyday goods are just as much the result of industrial production as machines or cars. However, operational technology also poses specific requirements in the area of critical infrastructures.
  • Different technical conditions prevail in the field of OT, posing particular challenges for cybersecurity.
  • The interaction of analogue systems and digital components leads to a convergence that has produced its own standards and protocols.
visibility
Steer, monitor, regulate Manufacturing systems and digital technology come together in the context of industrial production. Controlling, monitoring and regulating physical processes are at the centre of this, for which specific protocols exist. The term Operational Technology (OT) has become established for this, which describes the use of hardware and software to control production systems.
school
Terms from the OT world IT components are usually combined with mechanical and electronic parts using special IT modules that are equipped with special interfaces and components - Industrial Control Systems (ICS). Instead of OT, however, the term operating technology or cyber-physical systems is also used, as well as the term Supervisory Control and Data Acquisition (SCADA).
bolt
Critical Infrastructure inconceivable without OT The areas of application are very diverse and range from the control of robots in a factory plant to oil refineries, power plants, shipyards or transport and utility companies. The processes and workflows are correspondingly diverse. Industrial control systems can be found in a variety of manufacturing-intensive sectors, especially in critical infrastructure (CNI or KRITIS in German).
Factory hall with robots of an assembly line

it-sa 365 | IT Security Update

Security considerations with IT/OT Convergence

Typical methods - how OT systems can be protected

Specialised software systems are often used to protect OT systems from attacks. This also includes intrusion detection systems (IDS). An important measure is adaptive network segmentation, often combined with micro-segmentation. Customised patch management is also part of the OT security repertoire. Numerous providers have now specialised in this area.

Watch the video to find out all the key challenges and solutions for a successful OT security strategy. 

 

Expert knowledge in lecture form

Further actions on the topic live and on demand

Would you like to stay informed about the latest findings and trends in the field of OT security? Are you looking for an opportunity to expand your expert knowledge? IT security experts share their expertise with you in interactive live formats. Take the opportunity to ask your questions directly. Afterwards, all presentations are available on demand. Regardless of whether you want to watch a specific presentation again or catch up on a presentation you missed.

Register as an it-sa 365 user and gain access to our extensive knowledge hub!
Vernetzte Maschinen in einer Industrie-Fabrik

Special challenges for security in the OT segment

Production systems that very often run around the clock and cannot be switched off easily, systems with long service lives of often several decades that are not state of the art are just two examples of the particular challenges for security in the OT segment.

Special hardware components, proprietary protocols and specialised software usually prevent the use of traditional security products in OT and require other solutions, which were also presented at it-sa Expo&Congress 2023.

Networking

You are not yet a registered user of it-sa 365?

The it-sa 365 platform is available to you as a digital HOME OF IT SECURITY all year round. As a registered participant, you can use the platform free of charge and have the opportunity to network with experts and enter into direct dialogue 365 days a year. You can participate in the IT Security Talks and other events & actions at it-sa 365 free of charge. We will also keep you up to date with news about our digital programme and the it-sa Expo&Congress on site in Nuremberg.

We look forward to you joining the it-sa 365 community!