Save time with unbiased, independent feedback on vendor solutions.
Watch weekly bite-sized webinars hosted by IANS Faculty.
This checklist highlights best practices for ensuring the security of your organization’s OT environment. Based on the Purdue Reference Model for industrial control network segmentation, this checklist defines the layers, components, and boundary
controls for securing these networks.
We suggest using this checklist as a guide and not a complete set of steps for securing every type of OT environment.
READ: 7 Steps to Align IT, OT and Physical Security
READ: Understand the Roles of Red, Blue and Purple Teams
Although reasonable efforts will be made to ensure the completeness and accuracy of the information contained in our blog posts, no liability can be accepted by IANS or our Faculty members for the results of any actions taken by individuals or firms in
connection with such information, opinions, or advice.
February 21, 2024
By IANS Research
Learn why cloud IR is critical to security and not just another box to check. Find guidance to get started building a strong cloud IR program.
February 15, 2024
By Alex Sharpe, IANS Faculty
IANS Faculty member Alex Sharpe discusses the risks around AI adoption and provides governance guidance to make your AI launch safe and mitigate risk.
February 13, 2024
By IANS Faculty
Learn how to how to use NIST to modify secure baseline configurations to account for risk and improve security posture.