Forescout joins global cyber security alliance against operational technology threats
The Operational Technology Cyber Security Alliance aims to bridge dangerous security gaps in OT and critical infrastructures
Device visibility specialist Forescout has joined a new global cyber security alliance that aims to provide a technical and organisational framework to defend against operational technology (OT) threats.
The first group of its kind, the Operational Technology Cyber Security Alliance (OTCSA) was formed to bridge dangerous security gaps in OT and critical infrastructures, as well as industrial control systems (ICS).
To better protect businesses against the growing risk of these cyber-attacks, the OTCSA says its mission includes strengthening cyber-physical risk posture of OT environments and interfaces of OT/IT interconnectivity, as well as providing guidance for OT operators on how to protect their infrastructure in accordance with international regulations.
The alliance aims to guide OT suppliers on secure system architectures, relevant interfaces and security functionalities, while supporting the entire process and maintenance of their implementation. It will also help accelerate the time to adoption of these safer, more secure setups, Forescout explained.
"Critical infrastructures and industrial control systems are essential to organisation revenue and profits and the global economy," commented Damiano Bolzoni, vice president of industrial and OT business at Forescout.
"As the market leader in device visibility and control, Forescout is committed to collaborating with the industry to establish architectural, implementation and process guidelines that further strengthens the cyber security risk posture and resiliency of operational technology."
The OTCSA is the first industry group focused on improving cyber risk posture by providing tangible architecture, implementation and process guidelines.
As a result, the group says OT operators and solution providers will be able to navigate necessary changes, upgrades and integrations to evolving industry standards and regulations across the entire lifecycle.
The ultimate law enforcement agency guide to going mobile
Best practices for implementing a mobile device programFree download
The business value of Red Hat OpenShift
Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShiftFree download
Managing security and risk across the IT supply chain: A practical approach
Best practices for IT supply chain securityFree download
Digital remote monitoring and dispatch services’ impact on edge computing and data centres
Seven trends redefining remote monitoring and field service dispatch service requirementsFree download