OT Cybersecurity FAQs

Nozomi Networks' OT Cybersecurity FAQs help provide a foundational understanding of multiple aspects of OT cybersecurity.
What Is Operational Technology (OT)?

Operational technology (OT) refers to the hardware and software that controls or monitors assets used to automate physical processes. In doing so, it collects a wealth of information about the assets and processes it monitors that is useful for detecting important changes, both anomalies from the baseline and cybersecurity threats.

What Is IT/OT Convergence?

IT/OT convergence is the integration of information technology systems with operational technology systems, enabling physical systems to communicate with digital networks. It occurs when IT and OT devices connect or interact with one another within the same environment, sometimes unintentionally.

How Are OT and IT Cybersecurity Different?

IT security focuses on protecting data from unauthorized access or modification. OT security involves protecting the safe and reliable operation of physical processes.

How Do You Assess, Calculate and Prioritize Cyber Risk in OT?

When calculating OT risk you must factor in not just vulnerabilities but vulnerability risk, alert risk, communication risk, device risk, asset criticality and compensating controls. You can then prioritize mitigation based on asset exposure, likelihood of compromise, potential impact and organization risk tolerance.

Why Don't IT Endpoint Security Agents Work in OT?

IT endpoint security agents don’t work in OT because they’re heavyweight and disruptive, can’t understand OT/IoT protocols and aren’t trained on OT environments so detect the wrong threats.

What's the Difference Between Threat Detection and Anomaly Detection in OT?

Short Description: Comprehensive risk management in OT environments requires both signature-based threat detection and AI-powered behavior-based anomaly detection techniques to uncover known cyber threats as well as operational anomalies and zero-days.

Why Do Industrial Environments Rely on Passive vs. Active Monitoring?

Passive network monitoring is the standard for ICS asset inventory and threat and anomaly detection, but today industrial environments can safely rely on a combination of passive network and wireless monitoring as well as active polling, remote collection and endpoint security techniques.

How Is AI Used in OT/ICS Cybersecurity?

Because of their ability to rapidly analyze and correlate data at scale, AI and ML are accelerating nearly every aspect of cyber defense including asset inventory and intelligence, behavior baselining, anomaly and threat detection, event correlation, risk prioritization and noise reduction.