How Operational Technology (OT) Security is Redefining the CISO Role 

The digital transformation of industrial systems yields numerous benefits and efficiencies for business, but the resulting interconnectivity between these systems and an organization’s IT network has made operational technology (OT) increasingly susceptible to cyber threats. And while the role of CISOs in dealing with IT network security is well defined, many security leaders don’t know where to start when it comes to their OT defense strategy. Further complicating matters, traditional IT security tools are not compatible with OT environments, and conventional wisdom for defending IT environments is not always applicable.

This educational webinar led by Claroty and SANS Institute instructor Don Weber will teach CISOs what they need to know about OT security and offer guidance for implementing new strategies for mitigating risk in OT environments. Dave and Don will also offer guidance for assessing the performance of OT security initiatives, understanding key distinctions between IT and OT security, and effectively communicating the value of OT security to board members.


alex-wong-l5Tzv1alcps-unsplash (1)

Evaluation Criteria for Choosing an ICS Cyber Security Monitoring System

martin-adams-6_jamaU00bI-unsplash

Demo - The Claroty Platform


hector-j-rivas-1FxMET2U5dU-unsplash

Solution Brief - The Claroty Platform