SlideShare a Scribd company logo
What Operational Technology
Cyber Security is?
Operational Technology Cyber Security
Cyber Security – Operational Technology (OT) is hardware and software by the
direct observation and regulation of physical objects, systems, and activities in the
business, detects or triggers a transition.
here In industrial control systems (ICS)/ for example the SCADA system OT is
prevalent.
The need for OT protection increases exponentially as this technology evolves and
converges with networked technology.
Examples:
 power stations
 transit networks
 smart city appliances.
Here in this article, we will share with you some information about operational
technology cyber security that you should be aware of.
Safety and industrial management systems for Supervisory Control
and Data Acquisition Networks are related to Operational Technology Security.
So Protection of supervisory control and data acquisition networks,
a framework of control systems used in industrial activities, is the discipline of
SCADA defense.
Because Industrial Control Systems are usually software with a high availability
criterion and are mission-critical.
Force age on energy frameworks, admonitions from building data frameworks, or
petroleum processing plant breaking towers are ICS models.
So this sort of innovation is most broadly found in mechanical conditions.
Many Operational Technology types depend on PLCs (Programmable Logic
Controllers)
that obtain information from input devices or sensors, process data,
and perform specific tasks based on pre-programmed parameters or output
information.
PLCs used For
 monitor the productivity of the system,
 track operating temperatures,
 and stop or start processes automatically.
hence we mostly use it whenever a computer malfunctions cause alarm there.
What Are the Cyber Security Standards?
Cyber SecurityStandards
There are numerous network safety innovation standards out there that are intended to
secure the gadget and its clients in an unexpected way.
So There are distinct norms based on what type of data needs to be covered. Some of
the standard and significant criteria are given following:
1. ISO 27001
here ISO/IEC 27001 has widely known for providing requirements
for an information security management system (ISMS),
hence specifically, there are even more than a dozen standards in the
ISO/IEC 27000 family.
in fact, Using them enables the organization of any kind to manage
the security of assets such as :
financial information, intellectual property, employee
details, or information entrusted by third parties.
https://www.iso.org/
One of the common principles for incorporating an Information Security cybersecurity
technology management scheme that complies with the enterprise.
So The servers should exist without bugs.
i.e. It is an international standard, and any organization expressing other organizations
So that complies with this standard is expected to comply with the ISMS regulation
protected by ISO 27001.
2. PCI DSS
PCIDSS SECURING PAYMENTS
Since PCI-DSS stands for the Security Level of Payment Card Industry Records.
So This be the quality that the company that allows payment through their portal
would choose.
they collect clients info, example their name and card subordinate data.
In line with this compliance, the organization’s technologies should be up to date.
So Its system should undergo security assessment on an ongoing basis to ensure no
significant weakness.
Hence The card brands cluster created this norm (American Express, Visa,
MasterCard, JCB, and Discover).
3. HIPAA
The HealthInsurance PortabilityandAccountabilityActof 1996
HIPAA stands for Portability and Transparency Act on Health Care.
So The hospital must have the right network management unit that takes care of all
security issues to conform with this standard;
So That This norm assures because the patient’s sensitive health-related data can
remain safe to feel confident about their health.
4. FINRA
FINRA enablesinvestorsandfirmstoparticipate inthe marketwithconfidence bysafeguardingits
integrity
its stands for Regulatory Authority for the Banking Sector.
This norm is all about keeping it safe for financial institutions that administer funds
Because offensively participate in monetary transactions.
and to conform with this model, various data security and customer data privacy
mechanisms because it need to be analyzed.
It is one of the essential criteria that all finance-based organizations should follow.
5. DSGVO
DSGVO
Since GDPR stands for Legislation and General Data Security. It is a European
government define standard which is concerned with the data security of all
consumers.
Because of this standard, the agency that must handle implementation must ensure
that the user’s data is safe and cannot be accessed without proper consent.
What Is CyberSecurity?
What Is CyberSecurity?
Cybersecurity refers to a collection of systems, procedures, and activities designed to
deter intrusion, harm, or unwanted access to networks, facilities, services, and records.
Cybersecurity is critical because:
Critical information, including intellectual property, financial details, So The sensitive
data, or other forms of data about which improper entry or disclosure may have
detrimental implications, can make up a large portion of the data.
What Is Operational Technology Cyber Security Alliance
(OTCSA)?
CyberSecurityAlliances
Operational Technology Cyber Security Alliance (OTCSA) has developed to provide
tools and advice to OT operators and suppliers in a fast-evolving environment to
minimize their cyber risk.
so it means securing similar interfaces to allow IT accessibility simultaneously
facilitating but optimizing the everyday lives of people and employees in a changing
environment.
Because The Operational Technology Cyber Security Alliance provides daily
technical briefings and deployment guidance to OT operators
So their vendor ecosystems to handle required updates, enhancements, and
integrations.
We will develop and endorse awareness of OT cybersecurity issues and solutions
from the board room to the production floor.
Operational Technology Cyber Security Alliance facilitates cooperation between
leading IT and OT firms,
cybersecurity industry thought leaders, vendors, and OT operators from several
sectors.
Membership is available to any company that runs essential infrastructure
or general OT systems to manage its business (OT operators) and businesses because
offer IT and OT solutions (solution providers).
So Here it is Because :
OTCSA, established in 2019, is the first community of its kind to develop a strategic
and operational structure for safe and stable
OT: who, what, and how. For all OT operators and IT/OT solution providers,
membership is open.
FAQ’s- Operational Technology Cyber Security
Here in this section, we will let you know about all the FAQ’s that you have in mind
because this is something the must need to learn :
What Is Cyber Technology?
Computer technology involving the internet or cyberspace is Cyber Technology.
Since the internet plays such a significant part in our lives now, it’s easier than ever to
point out what cyber technology is.
Even the truck that you drive now is part of cyberinfrastructure, and it has internet
access.
What Is Operational Technology Cyber Security?
According to Gartner, Operational Technology (OT) is hardware and software
Because it identifies or induces a shift by specifically
observing and managing physical objects, processes, and events in the business.
So In industrial control systems (ICS), such as the SCADA system, OT is prevalent.
What Does Operational Technology Mean?
Operational technology or OT is a subset of electronic
and communication technologies Because it emphasize the physical equipment and
procedures they use to handle,
track, and operate manufacturing activities.
Industrial process properties and manufacturing/industrial facilities are tracked and
managed by operational technologies.
What Is Technology in Operation Management?
The scope of technology and operations management has grown over time and has
changed from product development
Because It is operating system and process architecture, power, and enhancement.
Operational management technologies have ensured that companies can minimize
costs,
optimize the distribution process, standardize, and enhance efficiency, and concentrate
on customization.
What Technology Is Used in Cyber Security?
Various tools are used in cyber defense, such as VDN (Virtual Dispersive
Networking), blockchain technology, artificial intelligence, authentication of
hardware, etc. Apart from these there are also many other technologies used in cyber
security utilizing Internet of Things ( IOT ) and Artificial Intellignece.
What Are Operational Technology Devices?
Operational technology or OT is a subset of electronic and communication
technologies
that emphasize the physical equipment and procedures they use to handle, track, and
operate manufacturing activities.
Industrial process properties and manufacturing/industrial facilities are tracked and
managed by operational technologies.
What Is the Difference Between Operational Technology and Information
Technology?
The major distinction between Operational Technology (OT) and IT devices is that
the physical world is operated by Operational Technology (OT) devices, while data is
handled by Information Technology (IT) systems.

More Related Content

PPTX
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
PDF
Soc and siem and threat hunting
PDF
John kingsley OT ICS SCADA Cyber security consultant
PDF
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
PPTX
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
PDF
Reference Security Architecture for Mobility- Insurance
PDF
Pöyry ICS Cyber Security brochure (English)
PDF
From Business Architecture to Security Architecture
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
Soc and siem and threat hunting
John kingsley OT ICS SCADA Cyber security consultant
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Reference Security Architecture for Mobility- Insurance
Pöyry ICS Cyber Security brochure (English)
From Business Architecture to Security Architecture

What's hot (20)

PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
PPT
2008: Web Application Security Tutorial
PPTX
Cyber Security Needs and Challenges
PPTX
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
PPTX
A holistic approach to risk management 20210210 w acfe france & cyber rea...
PDF
Cybersecurity roadmap : Global healthcare security architecture
PDF
Cyber security maturity model- IT/ITES
PDF
DTS Solution - Cyber Security Services Portfolio
PDF
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
PDF
Governance of security operation centers
PPTX
Critical Capabilities for MDR Services - What to Know Before You Buy
PDF
Achieving Visible Security at Scale with the NIST Cybersecurity Framework
PPTX
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
DOCX
Cyber Intelligence Operations Center
PPTX
Overview of Google’s BeyondCorp Approach to Security
PPT
Avoiding data breach using security intelligence and big data to stay out of ...
PDF
Cyber Security For Organization Proposal Powerpoint Presentation Slides
PPTX
Dragos S4x20: How to Build an OT Security Operations Center
PPTX
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
PDF
Application Security
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
2008: Web Application Security Tutorial
Cyber Security Needs and Challenges
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
A holistic approach to risk management 20210210 w acfe france & cyber rea...
Cybersecurity roadmap : Global healthcare security architecture
Cyber security maturity model- IT/ITES
DTS Solution - Cyber Security Services Portfolio
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Governance of security operation centers
Critical Capabilities for MDR Services - What to Know Before You Buy
Achieving Visible Security at Scale with the NIST Cybersecurity Framework
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Cyber Intelligence Operations Center
Overview of Google’s BeyondCorp Approach to Security
Avoiding data breach using security intelligence and big data to stay out of ...
Cyber Security For Organization Proposal Powerpoint Presentation Slides
Dragos S4x20: How to Build an OT Security Operations Center
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Application Security
Ad

Similar to What operational technology cyber security is? (20)

PDF
Deep Dive into Operational Technology Security - USCSI®.pdf
PPTX
Comparing Operational Technology (OT) Security And Information Technology (IT...
PDF
Why Corporate Security Professionals Should Care About Information Security
PDF
Advice for CISOs: How to Approach OT Cybersecurity
PDF
Who is responsible for and how in OT Security
DOCX
The Evolution and Impact of Ops Technology.docx
PPTX
Cloak your critical industrial control systems before they get hacked
PDF
OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...
PPTX
OT Solution Overview.pptx
PDF
Strategies for Managing OT Cybersecurity Risk
PDF
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
PPTX
Security of IOT,OT And IT.pptx
PDF
Cybersecurity solution-guide
PDF
Key Challenges Facing IT/OT: Hear From The Experts
PDF
Io t security defense in depth charles li v1 20180425c
PPTX
Cybersecurity in the Era of IoT
PDF
Cyber_Management_Issues.pdf
PDF
Cyber Security in Manufacturing
PPT
Indian perspective of cyber security
PPTX
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
Deep Dive into Operational Technology Security - USCSI®.pdf
Comparing Operational Technology (OT) Security And Information Technology (IT...
Why Corporate Security Professionals Should Care About Information Security
Advice for CISOs: How to Approach OT Cybersecurity
Who is responsible for and how in OT Security
The Evolution and Impact of Ops Technology.docx
Cloak your critical industrial control systems before they get hacked
OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...
OT Solution Overview.pptx
Strategies for Managing OT Cybersecurity Risk
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
Security of IOT,OT And IT.pptx
Cybersecurity solution-guide
Key Challenges Facing IT/OT: Hear From The Experts
Io t security defense in depth charles li v1 20180425c
Cybersecurity in the Era of IoT
Cyber_Management_Issues.pdf
Cyber Security in Manufacturing
Indian perspective of cyber security
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
Ad

Recently uploaded (20)

PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Approach and Philosophy of On baking technology
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Encapsulation theory and applications.pdf
PPT
Teaching material agriculture food technology
PDF
Electronic commerce courselecture one. Pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Tartificialntelligence_presentation.pptx
PPTX
Spectroscopy.pptx food analysis technology
Digital-Transformation-Roadmap-for-Companies.pptx
A comparative analysis of optical character recognition models for extracting...
Per capita expenditure prediction using model stacking based on satellite ima...
SOPHOS-XG Firewall Administrator PPT.pptx
Machine learning based COVID-19 study performance prediction
Approach and Philosophy of On baking technology
MYSQL Presentation for SQL database connectivity
Programs and apps: productivity, graphics, security and other tools
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Diabetes mellitus diagnosis method based random forest with bat algorithm
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Encapsulation theory and applications.pdf
Teaching material agriculture food technology
Electronic commerce courselecture one. Pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Agricultural_Statistics_at_a_Glance_2022_0.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Tartificialntelligence_presentation.pptx
Spectroscopy.pptx food analysis technology

What operational technology cyber security is?

  • 1. What Operational Technology Cyber Security is? Operational Technology Cyber Security Cyber Security – Operational Technology (OT) is hardware and software by the direct observation and regulation of physical objects, systems, and activities in the business, detects or triggers a transition. here In industrial control systems (ICS)/ for example the SCADA system OT is prevalent. The need for OT protection increases exponentially as this technology evolves and converges with networked technology. Examples:  power stations  transit networks  smart city appliances. Here in this article, we will share with you some information about operational technology cyber security that you should be aware of.
  • 2. Safety and industrial management systems for Supervisory Control and Data Acquisition Networks are related to Operational Technology Security. So Protection of supervisory control and data acquisition networks, a framework of control systems used in industrial activities, is the discipline of SCADA defense. Because Industrial Control Systems are usually software with a high availability criterion and are mission-critical. Force age on energy frameworks, admonitions from building data frameworks, or petroleum processing plant breaking towers are ICS models. So this sort of innovation is most broadly found in mechanical conditions. Many Operational Technology types depend on PLCs (Programmable Logic Controllers) that obtain information from input devices or sensors, process data, and perform specific tasks based on pre-programmed parameters or output information. PLCs used For  monitor the productivity of the system,  track operating temperatures,  and stop or start processes automatically. hence we mostly use it whenever a computer malfunctions cause alarm there.
  • 3. What Are the Cyber Security Standards? Cyber SecurityStandards There are numerous network safety innovation standards out there that are intended to secure the gadget and its clients in an unexpected way. So There are distinct norms based on what type of data needs to be covered. Some of the standard and significant criteria are given following: 1. ISO 27001 here ISO/IEC 27001 has widely known for providing requirements for an information security management system (ISMS), hence specifically, there are even more than a dozen standards in the ISO/IEC 27000 family. in fact, Using them enables the organization of any kind to manage the security of assets such as :
  • 4. financial information, intellectual property, employee details, or information entrusted by third parties. https://www.iso.org/ One of the common principles for incorporating an Information Security cybersecurity technology management scheme that complies with the enterprise. So The servers should exist without bugs. i.e. It is an international standard, and any organization expressing other organizations So that complies with this standard is expected to comply with the ISMS regulation protected by ISO 27001. 2. PCI DSS PCIDSS SECURING PAYMENTS
  • 5. Since PCI-DSS stands for the Security Level of Payment Card Industry Records. So This be the quality that the company that allows payment through their portal would choose. they collect clients info, example their name and card subordinate data. In line with this compliance, the organization’s technologies should be up to date. So Its system should undergo security assessment on an ongoing basis to ensure no significant weakness. Hence The card brands cluster created this norm (American Express, Visa, MasterCard, JCB, and Discover). 3. HIPAA The HealthInsurance PortabilityandAccountabilityActof 1996 HIPAA stands for Portability and Transparency Act on Health Care. So The hospital must have the right network management unit that takes care of all security issues to conform with this standard; So That This norm assures because the patient’s sensitive health-related data can remain safe to feel confident about their health.
  • 6. 4. FINRA FINRA enablesinvestorsandfirmstoparticipate inthe marketwithconfidence bysafeguardingits integrity its stands for Regulatory Authority for the Banking Sector. This norm is all about keeping it safe for financial institutions that administer funds Because offensively participate in monetary transactions. and to conform with this model, various data security and customer data privacy mechanisms because it need to be analyzed.
  • 7. It is one of the essential criteria that all finance-based organizations should follow. 5. DSGVO DSGVO Since GDPR stands for Legislation and General Data Security. It is a European government define standard which is concerned with the data security of all consumers. Because of this standard, the agency that must handle implementation must ensure that the user’s data is safe and cannot be accessed without proper consent.
  • 8. What Is CyberSecurity? What Is CyberSecurity? Cybersecurity refers to a collection of systems, procedures, and activities designed to deter intrusion, harm, or unwanted access to networks, facilities, services, and records. Cybersecurity is critical because: Critical information, including intellectual property, financial details, So The sensitive data, or other forms of data about which improper entry or disclosure may have detrimental implications, can make up a large portion of the data.
  • 9. What Is Operational Technology Cyber Security Alliance (OTCSA)? CyberSecurityAlliances Operational Technology Cyber Security Alliance (OTCSA) has developed to provide tools and advice to OT operators and suppliers in a fast-evolving environment to minimize their cyber risk. so it means securing similar interfaces to allow IT accessibility simultaneously facilitating but optimizing the everyday lives of people and employees in a changing environment. Because The Operational Technology Cyber Security Alliance provides daily technical briefings and deployment guidance to OT operators So their vendor ecosystems to handle required updates, enhancements, and integrations. We will develop and endorse awareness of OT cybersecurity issues and solutions from the board room to the production floor. Operational Technology Cyber Security Alliance facilitates cooperation between leading IT and OT firms,
  • 10. cybersecurity industry thought leaders, vendors, and OT operators from several sectors. Membership is available to any company that runs essential infrastructure or general OT systems to manage its business (OT operators) and businesses because offer IT and OT solutions (solution providers). So Here it is Because : OTCSA, established in 2019, is the first community of its kind to develop a strategic and operational structure for safe and stable OT: who, what, and how. For all OT operators and IT/OT solution providers, membership is open. FAQ’s- Operational Technology Cyber Security Here in this section, we will let you know about all the FAQ’s that you have in mind because this is something the must need to learn : What Is Cyber Technology? Computer technology involving the internet or cyberspace is Cyber Technology. Since the internet plays such a significant part in our lives now, it’s easier than ever to point out what cyber technology is. Even the truck that you drive now is part of cyberinfrastructure, and it has internet access. What Is Operational Technology Cyber Security? According to Gartner, Operational Technology (OT) is hardware and software Because it identifies or induces a shift by specifically observing and managing physical objects, processes, and events in the business. So In industrial control systems (ICS), such as the SCADA system, OT is prevalent. What Does Operational Technology Mean? Operational technology or OT is a subset of electronic
  • 11. and communication technologies Because it emphasize the physical equipment and procedures they use to handle, track, and operate manufacturing activities. Industrial process properties and manufacturing/industrial facilities are tracked and managed by operational technologies. What Is Technology in Operation Management? The scope of technology and operations management has grown over time and has changed from product development Because It is operating system and process architecture, power, and enhancement. Operational management technologies have ensured that companies can minimize costs, optimize the distribution process, standardize, and enhance efficiency, and concentrate on customization. What Technology Is Used in Cyber Security? Various tools are used in cyber defense, such as VDN (Virtual Dispersive Networking), blockchain technology, artificial intelligence, authentication of hardware, etc. Apart from these there are also many other technologies used in cyber security utilizing Internet of Things ( IOT ) and Artificial Intellignece. What Are Operational Technology Devices? Operational technology or OT is a subset of electronic and communication technologies that emphasize the physical equipment and procedures they use to handle, track, and operate manufacturing activities. Industrial process properties and manufacturing/industrial facilities are tracked and managed by operational technologies. What Is the Difference Between Operational Technology and Information Technology? The major distinction between Operational Technology (OT) and IT devices is that
  • 12. the physical world is operated by Operational Technology (OT) devices, while data is handled by Information Technology (IT) systems.