In this chapter, Norton discusses the importance of securing the levels 2 and 3 of an OT environment.
These are the operational layers that support the software and applications that run OT environments.
Without these layers, security cannot be secured.
Because of the always-up nature of OT environments, any tool that does not need frequent patching or updates is not applicable.
Forcing IT-designed tools into OT environments only adds complexity without addressing the fundamental security requirements and priorities of these environments.
To effectively secure OT environments, Norton warns, CISOs will need to become students again and lean on others to learn what they do not yet knowHow to secure the level 2 and three of a secure OT environment by leveraging others’ knowledge
๐ Feeling the vibes?
Keep the good energy going by checking out my Amazon affiliate link for some cool finds! ๐๏ธ
If not, consider contributing to my caffeine supply at Buy Me a Coffee โ๏ธ.
Your clicks = cosmic support for more awesome content! ๐๐
Leave a Reply