Beyond Cybersecurity: How an OT Asset Inventory Can Boost Operational Efficiency

Beyond Cybersecurity: How an OT Asset Inventory Can Boost Operational Efficiency

| | OT Protection
A detailed, up-to-date operational technology (OT) asset inventory is the foundation for an effective OT cybersecurity program. An organization’s asset inventory helps define the attack surface to be protected and is essential ...
Protecting Shipboard OT Systems

Protecting Shipboard OT Systems

 Modern shipping vessels are more than just carriers of goods—they're complex ecosystems of interconnected technology. However, as vessels become increasingly digitized and interconnected, they also become more vulnerable to cyber threats. Shipboard ...
Rough Seas: Overcoming the Challenges of Cybersecurity for Offshore Infrastructure

Rough Seas: Overcoming the Challenges of Cybersecurity for Offshore Infrastructure

| | OT Protection
 In the world of cybersecurity, few environments present as many challenges as oil platforms and other offshore infrastructure assets. These installations, often situated in harsh and isolated marine environments, are critical to ...
Building an OT Asset Inventory: How Mission Secure Does It

Building an OT Asset Inventory: How Mission Secure Does It

| | OT Protection
 An accurate, up-to-date asset inventory is the foundation for all OT cybersecurity. Together with an OT network map, the asset inventory provides a comprehensive view of the industrial environment and is the ...
“Known Good” vs “Known Bad”: Choosing a Starting Point for OT Cybersecurity

“Known Good” vs “Known Bad”: Choosing a Starting Point for OT Cybersecurity

| | OT Protection
There are many ways to separate cybersecurity solutions into categories. For example, you can separate them based on where they take action (network vs endpoint), where they reside (cloud vs on prem), ...
“Known Good” or “Known Bad”: Choosing a Starting Point for OT Cybersecurity

“Known Good” or “Known Bad”: Choosing a Starting Point for OT Cybersecurity

| | OT Protection
 One way to characterize a cybersecurity strategy is by whether it takes action based on the definition of “known good” activity or “known bad” activity. The “known bad” approach attempts to identify ...
Cybersecurity for traffic and transportation systems: What can we learn from NERC CIP and IMO?

Cybersecurity for traffic and transportation systems: What can we learn from NERC CIP and IMO?

| | OT Protection
 From traffic operations centers and Advanced Traffic Management Systems (ATMS) to field signal cabinets and traffic control devices, transportation systems use digital and automated components to manage physical processes—the flow and control ...
Securing Transportation and Smart Mobility Systems: a Case Study from the ARC Industry Forum

Securing Transportation and Smart Mobility Systems: a Case Study from the ARC Industry Forum

Mission Secure was happy to return to one of our favorite events, the ARC Industry Forum, in 2023. Over four days in Orlando, our team had the opportunity to meet hundreds of ...

Zero Trust for Operational Technology: 6 Key Considerations

| | OT Protection
 Zero Trust has become the dominant paradigm for IT security, influencing how organizations around the world design their networks and grant access to systems and data. In fact, the Zero Trust concept ...

OT Cybersecurity in 2021 and Beyond Series: Part III – Protection

“…organizations must assume in their planning of not only a malfunctioning or inoperative control system, but a control system that is actively acting contrary to the safe and reliable operation of the ...