SlideShare a Scribd company logo
FORRESTER RESEARCH
ON OT CYBERSECURITY
www.fortinet.com
CONVERGENCE OF OT AND IT IS HAPPENING-
AND OPENING UP OT SYSTEMSTO IT-STYLE CYBER ATTACKS!1
SECURITY BREACHES HAVE INCREASED INTHE PASTYEAR1
OVER 90% HAVE SEEN SOME LEVEL OF IMPACT FROM A SECURITY BREACHTO
THEIR SCADA/ICS1
OF DEVICES CAN EXECUTE
SECOND ORDER ACTIONS
AND CONTROL OVER
SMART DEVICES
USE OF CLOUD IN ICS SOLUTIONS AND
INABILITYTO IDENTIFY OR ACT ON RISK.1
1: A commissioned study conducted by Forrester Consulting on behalf of Fortinet, January 2018
17% OF DEVICES ARE“AWARE”
OFTHEIR SURROUNDINGS
AND CAN ACT UPON
COLLECTED DATA
24% HAVE BASIC DATA COLLECTION SENSORS,
FEEDINGTHAT DATATO A CENTRAL DATA
STORAGE SYSTEM
AND NOTTO EACH OTHER
35%
HASTHE SCADA/ICS ATYOUR ORGANIZATION
EXPERIENCED A SECURITY BREACH?1
HAVE EXPERIENCED A BREACH IN LASTYEAR, AND ALMOST 90%
KNOWTHEY HAVE BEEN BREACHED!
56%
BIG NEWS!
GOVERNMENT AGENCIES
OT NETWORKS COMPLETELY OPENTO OUTSIDEVENDORS
THIRD PARTIES RESPONSIBLE
FOR ORGANIZATION’S IT
FUNCTIONS
17%
COMPLETE ACCESSWITH NO
RESTRICTIONS PROVIDEDTO:
BUSINESS PARTNERS
21%
16% OF FIRMS OUTSOURCE AT LEAST SOME
FUNCTION OFTHEIR ORGANIZATION’S
SCADA/ICS
56%
SECURITY BREACH
BETWEEN 6 MONTHSTO
LESSTHAN 12 MONTHS
AGO
30%
38%
SECURITY BREACH
BETWEEN 1YEARTO
LESSTHAN 2YEARS
AGO
19%
21%
20182016
ANDTHE BREACHING
IS GETTINGWORSE!
54
%
AT LEAST
HAVE SEEN A HIGH/CRITICAL IMPACT ON A RANGE OF AREAS FROM ABILITYTO
MEET COMPLIANCE AND DECREASED FUNCTIONALITYTO EMPLOYEE SAFETY
IoT IS A GROWINGTREND IN OT SPACESWITH
LOTS OF DIFFERENT KINDS OF DEVICES SHOWING
UP ONTHE NETWORK.1
ON AVERAGE, FIRMS
HAVE
4.7 TECH CONNECTEDTO
THEIR NETWORK
100 % HAVE IoTTECHNOLOGIES
CONNECTEDTOTHEIR ORG’S
NETWORK
FORTINET IS KNOWN AS A LEADING
VENDOR OF OT SOLUTIONS1
VENDORS KNOWN FOR OT CYBER SECURITY SOLUTIONS
FORTINET
GE
25%
23%
22%
20%
CYBERX
HONEYWELL-NEXTNINE
IBM PAS
AND ARETAKING CONCRETE STEPSTO IMPLEMENT
OR IMPROVE SECURITY ON A NUMBER OF ATTACK POINTS.
WHILE OT SECURITY IS A PROBLEM...
OT OPERATORS
ARE AWARE OF IT
19%
31%
HOW DOYOU EXPECTYOUR ORGANIZATION’S SCADA/ICS SECURITY
WILL SPEND INTHE FOLLOWING AREASTO CHANGE FROM 2016TO
27%
11%REMAINTHE SAME
INCREASE BY LESSTHAN
5%
INCREASE BETWEEN 5%
and 10%
INCREASE BY MORE
THAN 10%
77%INCREASE

More Related Content

What's hot

Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google Apps
Elastica Inc.
 
Protecting Your Data In Office 365
Protecting Your Data In Office 365Protecting Your Data In Office 365
Protecting Your Data In Office 365
Elastica Inc.
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security Strategies
Cisco Security
 
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
VMware
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
Omar Khawaja
 
“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security
Ahmed Banafa
 
Enabling Dropbox for Business
Enabling Dropbox for BusinessEnabling Dropbox for Business
Enabling Dropbox for Business
Elastica Inc.
 
Limitless xdr meetup
Limitless xdr meetupLimitless xdr meetup
Limitless xdr meetup
Daliya Spasova
 
Survival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient OrganizationSurvival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient Organization
Tripwire
 
Mobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested RealityMobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested Reality
Zimperium
 
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityDebunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust Security
Centrify Corporation
 
Should You Be Automating
Should You Be AutomatingShould You Be Automating
Should You Be Automating
Siemplify
 
Protect your company from zero-day with ESET Dynamic Threat Defense
Protect your company from zero-day with ESET Dynamic Threat DefenseProtect your company from zero-day with ESET Dynamic Threat Defense
Protect your company from zero-day with ESET Dynamic Threat Defense
Adi Saputra
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
AlgoSec
 
Medical Devices Under Attack
Medical Devices Under Attack Medical Devices Under Attack
Medical Devices Under Attack
Medigate
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
Prime Infoserv
 
Seen at InfoSec Europe 2015: Spot your Snowden!
Seen at InfoSec Europe 2015: Spot your Snowden!Seen at InfoSec Europe 2015: Spot your Snowden!
Seen at InfoSec Europe 2015: Spot your Snowden!
John Wallix
 
An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...
Max Justice
 
Top Threats Facing Organizations Cloud / SaaS Data
Top Threats Facing Organizations Cloud / SaaS DataTop Threats Facing Organizations Cloud / SaaS Data
Top Threats Facing Organizations Cloud / SaaS Data
SysCloud
 
What You Need to Know About Intelligent Network Segmentation
What You Need to Know About Intelligent Network SegmentationWhat You Need to Know About Intelligent Network Segmentation
What You Need to Know About Intelligent Network Segmentation
Medigate
 

What's hot (20)

Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google Apps
 
Protecting Your Data In Office 365
Protecting Your Data In Office 365Protecting Your Data In Office 365
Protecting Your Data In Office 365
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security Strategies
 
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
 
“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security
 
Enabling Dropbox for Business
Enabling Dropbox for BusinessEnabling Dropbox for Business
Enabling Dropbox for Business
 
Limitless xdr meetup
Limitless xdr meetupLimitless xdr meetup
Limitless xdr meetup
 
Survival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient OrganizationSurvival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient Organization
 
Mobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested RealityMobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested Reality
 
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityDebunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust Security
 
Should You Be Automating
Should You Be AutomatingShould You Be Automating
Should You Be Automating
 
Protect your company from zero-day with ESET Dynamic Threat Defense
Protect your company from zero-day with ESET Dynamic Threat DefenseProtect your company from zero-day with ESET Dynamic Threat Defense
Protect your company from zero-day with ESET Dynamic Threat Defense
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
Medical Devices Under Attack
Medical Devices Under Attack Medical Devices Under Attack
Medical Devices Under Attack
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Seen at InfoSec Europe 2015: Spot your Snowden!
Seen at InfoSec Europe 2015: Spot your Snowden!Seen at InfoSec Europe 2015: Spot your Snowden!
Seen at InfoSec Europe 2015: Spot your Snowden!
 
An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...
 
Top Threats Facing Organizations Cloud / SaaS Data
Top Threats Facing Organizations Cloud / SaaS DataTop Threats Facing Organizations Cloud / SaaS Data
Top Threats Facing Organizations Cloud / SaaS Data
 
What You Need to Know About Intelligent Network Segmentation
What You Need to Know About Intelligent Network SegmentationWhat You Need to Know About Intelligent Network Segmentation
What You Need to Know About Intelligent Network Segmentation
 

Similar to Forrester Research on OT Cybersecurity

Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
TechBiz Forense Digital
 
IoT Slam Healthcare 12-02-2016
IoT Slam Healthcare 12-02-2016 IoT Slam Healthcare 12-02-2016
IoT Slam Healthcare 12-02-2016
Great Bay Software
 
Računalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidenteRačunalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidenteDamir Delija
 
Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco's 2016 Annual Security report
Cisco's 2016 Annual Security report
Cisco Canada
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
Nozomi Networks
 
Anti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewskiAnti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewskiStonesoft
 
THE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidanceTHE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidancePam Gilmore
 
Data Integrity Protection
Data Integrity ProtectionData Integrity Protection
Data Integrity Protection
proitsolutions
 
LIS3353 SP12 Week 9
LIS3353 SP12 Week 9LIS3353 SP12 Week 9
LIS3353 SP12 Week 9Amanda Case
 
Best of Positive Research 2013
Best of Positive Research 2013Best of Positive Research 2013
Best of Positive Research 2013
qqlan
 
The FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
The FDA - Mobile, and Fixed Medical Devices Cybersecurity GuidanceThe FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
The FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
Valdez Ladd MBA, CISSP, CISA,
 
Perimeter Security is Failing
Perimeter Security is FailingPerimeter Security is Failing
Perimeter Security is Failing
UL Transaction Security
 
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)sandhibhide
 
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
eFax Corporate®
 
Government-ForeScout-Solution-Brief
Government-ForeScout-Solution-BriefGovernment-ForeScout-Solution-Brief
Government-ForeScout-Solution-BriefJonathan Reyes
 
The State of Threat Detection 2019
The State of Threat Detection 2019The State of Threat Detection 2019
The State of Threat Detection 2019
Fidelis Cybersecurity
 
A6704d01
A6704d01A6704d01
A6704d01
mudigonda
 
L11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptxL11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptx
StevenTharp2
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 

Similar to Forrester Research on OT Cybersecurity (20)

Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
IoT Slam Healthcare 12-02-2016
IoT Slam Healthcare 12-02-2016 IoT Slam Healthcare 12-02-2016
IoT Slam Healthcare 12-02-2016
 
Računalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidenteRačunalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidente
 
Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco's 2016 Annual Security report
Cisco's 2016 Annual Security report
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
 
Anti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewskiAnti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewski
 
IDS Research
IDS ResearchIDS Research
IDS Research
 
THE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidanceTHE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity Guidance
 
Data Integrity Protection
Data Integrity ProtectionData Integrity Protection
Data Integrity Protection
 
LIS3353 SP12 Week 9
LIS3353 SP12 Week 9LIS3353 SP12 Week 9
LIS3353 SP12 Week 9
 
Best of Positive Research 2013
Best of Positive Research 2013Best of Positive Research 2013
Best of Positive Research 2013
 
The FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
The FDA - Mobile, and Fixed Medical Devices Cybersecurity GuidanceThe FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
The FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
 
Perimeter Security is Failing
Perimeter Security is FailingPerimeter Security is Failing
Perimeter Security is Failing
 
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
 
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
 
Government-ForeScout-Solution-Brief
Government-ForeScout-Solution-BriefGovernment-ForeScout-Solution-Brief
Government-ForeScout-Solution-Brief
 
The State of Threat Detection 2019
The State of Threat Detection 2019The State of Threat Detection 2019
The State of Threat Detection 2019
 
A6704d01
A6704d01A6704d01
A6704d01
 
L11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptxL11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptx
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 

More from Fortinet

Fortinet's Secure SD-WAN: Gartner Peer Insights Reviews
Fortinet's Secure SD-WAN: Gartner Peer Insights ReviewsFortinet's Secure SD-WAN: Gartner Peer Insights Reviews
Fortinet's Secure SD-WAN: Gartner Peer Insights Reviews
Fortinet
 
FortiClient Fabric Agent Trial
FortiClient Fabric Agent TrialFortiClient Fabric Agent Trial
FortiClient Fabric Agent Trial
Fortinet
 
Why Partners Who Charge for Technical Assessments Have Higher Growth and Profit
Why Partners Who Charge for Technical Assessments Have Higher Growth and ProfitWhy Partners Who Charge for Technical Assessments Have Higher Growth and Profit
Why Partners Who Charge for Technical Assessments Have Higher Growth and Profit
Fortinet
 
The What and Why of PBM and OML
The What and Why of PBM and OML The What and Why of PBM and OML
The What and Why of PBM and OML
Fortinet
 
The Importance of Targeting your Customers - Cross Selling Execution
The Importance of Targeting your Customers - Cross Selling ExecutionThe Importance of Targeting your Customers - Cross Selling Execution
The Importance of Targeting your Customers - Cross Selling Execution
Fortinet
 
Fortinet Connected UTM
Fortinet Connected UTMFortinet Connected UTM
Fortinet Connected UTM
Fortinet
 
Fortinet Icon Library
Fortinet Icon LibraryFortinet Icon Library
Fortinet Icon Library
Fortinet
 
Securing the Internet of Things 2017
Securing the Internet of Things 2017Securing the Internet of Things 2017
Securing the Internet of Things 2017
Fortinet
 
Infographic: Fortinet Q1 2017 Threat Landscape Report
Infographic: Fortinet Q1 2017 Threat Landscape ReportInfographic: Fortinet Q1 2017 Threat Landscape Report
Infographic: Fortinet Q1 2017 Threat Landscape Report
Fortinet
 
Protecting Higher Education Data
Protecting Higher Education DataProtecting Higher Education Data
Protecting Higher Education Data
Fortinet
 
Q4 Threat Report 2016
Q4 Threat Report 2016Q4 Threat Report 2016
Q4 Threat Report 2016
Fortinet
 
Infographic Protecting Patient Data
Infographic  Protecting Patient Data Infographic  Protecting Patient Data
Infographic Protecting Patient Data
Fortinet
 

More from Fortinet (12)

Fortinet's Secure SD-WAN: Gartner Peer Insights Reviews
Fortinet's Secure SD-WAN: Gartner Peer Insights ReviewsFortinet's Secure SD-WAN: Gartner Peer Insights Reviews
Fortinet's Secure SD-WAN: Gartner Peer Insights Reviews
 
FortiClient Fabric Agent Trial
FortiClient Fabric Agent TrialFortiClient Fabric Agent Trial
FortiClient Fabric Agent Trial
 
Why Partners Who Charge for Technical Assessments Have Higher Growth and Profit
Why Partners Who Charge for Technical Assessments Have Higher Growth and ProfitWhy Partners Who Charge for Technical Assessments Have Higher Growth and Profit
Why Partners Who Charge for Technical Assessments Have Higher Growth and Profit
 
The What and Why of PBM and OML
The What and Why of PBM and OML The What and Why of PBM and OML
The What and Why of PBM and OML
 
The Importance of Targeting your Customers - Cross Selling Execution
The Importance of Targeting your Customers - Cross Selling ExecutionThe Importance of Targeting your Customers - Cross Selling Execution
The Importance of Targeting your Customers - Cross Selling Execution
 
Fortinet Connected UTM
Fortinet Connected UTMFortinet Connected UTM
Fortinet Connected UTM
 
Fortinet Icon Library
Fortinet Icon LibraryFortinet Icon Library
Fortinet Icon Library
 
Securing the Internet of Things 2017
Securing the Internet of Things 2017Securing the Internet of Things 2017
Securing the Internet of Things 2017
 
Infographic: Fortinet Q1 2017 Threat Landscape Report
Infographic: Fortinet Q1 2017 Threat Landscape ReportInfographic: Fortinet Q1 2017 Threat Landscape Report
Infographic: Fortinet Q1 2017 Threat Landscape Report
 
Protecting Higher Education Data
Protecting Higher Education DataProtecting Higher Education Data
Protecting Higher Education Data
 
Q4 Threat Report 2016
Q4 Threat Report 2016Q4 Threat Report 2016
Q4 Threat Report 2016
 
Infographic Protecting Patient Data
Infographic  Protecting Patient Data Infographic  Protecting Patient Data
Infographic Protecting Patient Data
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 

Forrester Research on OT Cybersecurity

  • 1. FORRESTER RESEARCH ON OT CYBERSECURITY www.fortinet.com CONVERGENCE OF OT AND IT IS HAPPENING- AND OPENING UP OT SYSTEMSTO IT-STYLE CYBER ATTACKS!1 SECURITY BREACHES HAVE INCREASED INTHE PASTYEAR1 OVER 90% HAVE SEEN SOME LEVEL OF IMPACT FROM A SECURITY BREACHTO THEIR SCADA/ICS1 OF DEVICES CAN EXECUTE SECOND ORDER ACTIONS AND CONTROL OVER SMART DEVICES USE OF CLOUD IN ICS SOLUTIONS AND INABILITYTO IDENTIFY OR ACT ON RISK.1 1: A commissioned study conducted by Forrester Consulting on behalf of Fortinet, January 2018 17% OF DEVICES ARE“AWARE” OFTHEIR SURROUNDINGS AND CAN ACT UPON COLLECTED DATA 24% HAVE BASIC DATA COLLECTION SENSORS, FEEDINGTHAT DATATO A CENTRAL DATA STORAGE SYSTEM AND NOTTO EACH OTHER 35% HASTHE SCADA/ICS ATYOUR ORGANIZATION EXPERIENCED A SECURITY BREACH?1 HAVE EXPERIENCED A BREACH IN LASTYEAR, AND ALMOST 90% KNOWTHEY HAVE BEEN BREACHED! 56% BIG NEWS! GOVERNMENT AGENCIES OT NETWORKS COMPLETELY OPENTO OUTSIDEVENDORS THIRD PARTIES RESPONSIBLE FOR ORGANIZATION’S IT FUNCTIONS 17% COMPLETE ACCESSWITH NO RESTRICTIONS PROVIDEDTO: BUSINESS PARTNERS 21% 16% OF FIRMS OUTSOURCE AT LEAST SOME FUNCTION OFTHEIR ORGANIZATION’S SCADA/ICS 56% SECURITY BREACH BETWEEN 6 MONTHSTO LESSTHAN 12 MONTHS AGO 30% 38% SECURITY BREACH BETWEEN 1YEARTO LESSTHAN 2YEARS AGO 19% 21% 20182016 ANDTHE BREACHING IS GETTINGWORSE! 54 % AT LEAST HAVE SEEN A HIGH/CRITICAL IMPACT ON A RANGE OF AREAS FROM ABILITYTO MEET COMPLIANCE AND DECREASED FUNCTIONALITYTO EMPLOYEE SAFETY IoT IS A GROWINGTREND IN OT SPACESWITH LOTS OF DIFFERENT KINDS OF DEVICES SHOWING UP ONTHE NETWORK.1 ON AVERAGE, FIRMS HAVE 4.7 TECH CONNECTEDTO THEIR NETWORK 100 % HAVE IoTTECHNOLOGIES CONNECTEDTOTHEIR ORG’S NETWORK FORTINET IS KNOWN AS A LEADING VENDOR OF OT SOLUTIONS1 VENDORS KNOWN FOR OT CYBER SECURITY SOLUTIONS FORTINET GE 25% 23% 22% 20% CYBERX HONEYWELL-NEXTNINE IBM PAS AND ARETAKING CONCRETE STEPSTO IMPLEMENT OR IMPROVE SECURITY ON A NUMBER OF ATTACK POINTS. WHILE OT SECURITY IS A PROBLEM... OT OPERATORS ARE AWARE OF IT 19% 31% HOW DOYOU EXPECTYOUR ORGANIZATION’S SCADA/ICS SECURITY WILL SPEND INTHE FOLLOWING AREASTO CHANGE FROM 2016TO 27% 11%REMAINTHE SAME INCREASE BY LESSTHAN 5% INCREASE BETWEEN 5% and 10% INCREASE BY MORE THAN 10% 77%INCREASE