Loading
Rockwell Automation Left Bug Logo

The Importance of Zero Trust in OT Environments

Discover where and how to begin on the path to Zero Trust.
Dark blue background with glowing abstracts representing industrial networks. Large lock visual representing OT cybersecurity.

Zero trust is a security model that emphasizes strict access controls, least privilege principles, and continuous verification – regardless of inside or outside boundaries. This approach offers significant benefits for securing operational technology (OT) environments and critical infrastructure.

However, practical implementation of zero trust in OT poses unique challenges that must be addressed:

  • Legacy OT systems often lack necessary security controls for zero trust implementation
  • Continuous verification measures like multi-factor authentication can impact safety-critical operations
  • Limited vendor support makes comprehensive zero trust difficult across diverse OT environments

Together with Dragos, Rockwell Automation underwrote this fireside dinner discussing Zero Trust as it applies to industrial environments.  Throughout this video series, industry-leading experts will answer the hottest questions around Zero Trust, such as where and how to start when implementing a Zero Trust strategy in OT environments, what steps to take to make your Zero Trust approach successful, what technology must be in place to support a zero trust initiative, and more.


1. Implementation Tips

Video Player
Chevron DownChevron Down
Fireside Chat Thumbnail - 1
Download File

Media error: Format(s) not supported or source(s) not found

Download File: https://rockwellautomation.scene7.com/is/content/rockwellautomation/Dragos-Zero-Trust-Fireside-Chat-EN
00:00
00:00
00:00
Use Up/Down Arrow keys to increase or decrease volume.

The Series begins with experts discussing how to implement Zero Trust in OT environments.  From there, you can learn how OT and IT teams can work better together, leveraging the strengths of each to increase cybersecurity resiliency.  Finally, this team of experts will discuss the challenges of implementing Zero Trust and the importance of the "bolts" framework in considering the potential impact on critical infrastructure.


2. Defining the Zero Trust Protect Surface

Learn how zero trust can be applied to critical infrastructure and industrial control systems to build cybersecurity resiliency. Discover the concept of a "protect surface" and how it can help shrink a system's attack surface down to a manageable set of policies and controls. Understand the importance of knowing what must be protected to implement effective security measures.

Video Player
Chevron DownChevron Down

Media error: Format(s) not supported or source(s) not found

Download File: https://rockwellautomation.scene7.com/is/content/rockwellautomation/Zero-Trust-John-Kindervag-En
00:00
00:00
00:00
Use Up/Down Arrow keys to increase or decrease volume.

3. The Role of Identity Access Management

Video Player
Chevron DownChevron Down

Media error: Format(s) not supported or source(s) not found

Download File: https://rockwellautomation.scene7.com/is/content/rockwellautomation/Zero-Trust-Eve-Maler
00:00
00:00
00:00
Use Up/Down Arrow keys to increase or decrease volume.

Join our discussion on the importance of understanding the role of identity in operational technology and the zero trust principle. Learn about the relationship between people and machines for better authorization and access decisions. Discover the potential for growth and convergence between OT and IT and learn about the importance of considering the regulatory environment and improving communication and collaboration across functional teams.


4. The Importance of Visibility in Zero Trust

Implementing a zero trust strategy can be extremely beneficial for supply chain security. In this video, experts discuss the SolarWinds compromise and the zero trust executive order.  Learn about the importance of identifying and understanding dependencies within critical infrastructure, and the need for clear visibility and controls to mitigate risks and help prevent future breaches.

Video Player
Chevron DownChevron Down

Media error: Format(s) not supported or source(s) not found

Download File: https://rockwellautomation.scene7.com/is/content/rockwellautomation/Zero-Trust-Exodus-Almasude-En
00:00
00:00
00:00
Use Up/Down Arrow keys to increase or decrease volume.

5. Compliance, Contracts, and Law

Video Player
Chevron DownChevron Down

Media error: Format(s) not supported or source(s) not found

Download File: https://rockwellautomation.scene7.com/is/content/rockwellautomation/Zero-Trust-George-Finney-En
00:00
00:00
00:00
Use Up/Down Arrow keys to increase or decrease volume.

It can be challenging to navigate the intersection between compliance, contracts, e-discovery, and the law in relation to information security policies. Explore the complex relationship between these key areas and learn how to navigate them effectively.


6. The IT and OT Connection

Join the discussion on the importance of understanding how a system works in order to secure it, with a focus on the need for OT environments to prioritize security. Learn about the similarities and differences between IT and OT architecture within the context of zero trust and discover the need to protect against attacks and maintain uptime.

Video Player
Chevron DownChevron Down

Media error: Format(s) not supported or source(s) not found

Download File: https://rockwellautomation.scene7.com/is/content/rockwellautomation/Zero-Trust-Lionel_Jacobs-En
00:00
00:00
00:00
Use Up/Down Arrow keys to increase or decrease volume.
Contact a cybersecurity expert to learn more
Contact Us

Others also viewed

Loading
Loading
Loading
Loading

Based on your activity

Loading
Loading
Loading
Loading
Please update your cookie preferences to continue.
This feature requires cookies to enhance your experience. Please update your preferences to allow for these cookies:
  • Social Media Cookies
  • Functional Cookies
  • Performance Cookies
  • Marketing Cookies
  • All Cookies
You can update your preferences at any time. For more information please see our Privacy Policy
CloseClose