Schaedler Yesco

Securing Critical Infrastructure


The Comprehensive Resource Guide for Securing Critical Infrastructure

Cybersecurity Best Practices for Protecting OT Organizations

Critical Infrastructure organizations are undergoing digital transformation, digitizing processes and adopting Internet of Things (IoT) technology to improve efficiency and reliability. The resulting connectivity of operational technology (OT) to the internet and the convergence between OT and IT have created extreme efficiencies, as well as new vulnerabilities and exposure to cybersecurity threats. Many of the principles for defending your IT environment apply to industrial control systems (ICS), supervisory control and data acquisition (SCADA) systems and other OT. But securing OT has additional complexities and considerations.

We’ve created this resource guide with more than 80 useful reference links, categorized and described, to provide shortcuts for learning about the evolving Critical Infrastructure threat landscape, the modern industrial cybersecurity practices used for defense, and steps to formulating your own plans and strategies. Download this Resource Guide to learn:

  1. OT Cybersecurity Basics and Best Practices
  2. Regulations: CISA (US and US gov't), Legal, NIS Directive (EU)
  3. Cybersecurity Roadmaps to Follow: NIST, MITRE ATTandCK, Sector-Specific Guides (US), IEC 62443, CAF (UK)
  4. NIST Breakdown (5 components) - Identify, Protect, Detect, Respond, Recover
  5. Resources for Designing an OT Architecture + Zero Trust and John Kindervag
  6. Understanding the US CI Grant: Use Rockwell Automation 's Free Plan Template
  7. Industry Specifics, such as Water/Wastewater, Utilities, Pipelines, Manufacturing

    Additional News