Key factors for cybersecurity and privacy in the Internet of Things

Understanding the NIST 8228 report

Information Technology (IT) and Operational Technology (OT) are different in a lot of ways, from their design to their maintenance workflows and more. When IT and OT merge, these differences create all new challenges for cybersecurity. 

IT has standards for protecting device security, data security, and people’s privacy, but these standards do not make sense for many connected OT devices. In IT, for example, cybersecurity vulnerabilities are the absolute top priority. In OT, operations are the top priority, while network security is a close second. Ensuring the building is still functioning as expected is critical to maintain physical safety and security, before addressing a network vulnerability. 

Last year, the National Institute of Standards and Technology (NIST) released the report “Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks,” exploring these exact differences and cybersecurity threats. The report is an in-depth analysis of current threats and how IoT devices can or cannot meet those threats head-on. 

This is a huge opportunity to pull in your IT counterpart and collaborate on cybersecurity standards that make sense for your connected OT devices.

Join us for a one-hour webinar digging into the report, where we’ll summarize what IT and OT teams on the ground should know about their systems and security. We’ll dig into top risks identified in the report, challenges for securing the Internet of Things, and NIST’s recommendations.

Register now!

Date: February 25th, 2020
Time: 11:30 a.m. PDT / 2:30 p.m. EDT

Do you need help analyzing and solving a problematic BACnet network? Send your pcaps in, and our team of BACnet buffs will show you how they dig into files, from start to finish.

Visual BACnet is a powerful visualization tool for building automation system service providers.

BACnet is a widely used protocol for building networks that provides many benefits for connected building automation systems. But there are many issues that commonly plague BACnet networks.

Find out all the power and control you can get out of Optigo OneView.

What are MAC addresses, and how can you use them to help secure your network? Learn how OneClick Secure from Optigo OneView helps you secure your Operational Technology network in an instant.

An Operational Technology network can be made up of unmanaged switches, managed switches, or a centralized Network Management System (NMS). Learn about the differences between these different systems, and some of the pros and cons of each.

There are many protocols that make up the application layer of an IP network. Learn about some protocols you may have heard about, the roles they play on the application layer, and the importance of encryption.

Understand the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), and how they facilitate the sending and receiving of messages over IP networks.

A Virtual Private Network could be described as a “secure, encrypted tunnel,” and it’s a big topic these days as more folks work from home. Find out what a VPN is, and how it works.