Events , Governance & Risk Management , Operational Technology (OT)

Why OT Cybersecurity Is Daunting and How to Address It

Lesley Carhart of Dragos on Responding to OT Cybersecurity Risks
Lesley Carhart, director of incident response, Dragos

In the ever-shifting cybersecurity threat landscape, IT risks have never been more prominent. But what about operational technology? Lesley Carhart of Dragos discusses OT vulnerabilities, how adversaries are taking advantage and why Dragos has launched a new OT CERT.

See Also: The Top 5 Security Practices With the Best Outcomes

In a video interview with Information Security Media Group at RSA Conference 2022, Carhart also discusses:

  • How adversaries are targeting OT;
  • Five critical OT security controls;
  • The mission of the OT CERT.

Carhart manages a team of incident response and digital forensics professionals across North America who perform investigations of commodity, targeted and insider threat cases in industrial networks. Carhart is also a certified instructor and curriculum developer for Dragos' incident response and threat hunting courses. Prior to that, Carhart spent four years as a principal incident responder for Dragos, and before that served as the incident response team lead at Motorola Solutions.


About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.