SlideShare a Scribd company logo
FORRESTER RESEARCH
ON OT CYBERSECURITY
www.fortinet.com
CONVERGENCE OF OT AND IT IS HAPPENING-
AND OPENING UP OT SYSTEMSTO IT-STYLE CYBER ATTACKS!1
SECURITY BREACHES HAVE INCREASED INTHE PASTYEAR1
OVER 90% HAVE SEEN SOME LEVEL OF IMPACT FROM A SECURITY BREACHTO
THEIR SCADA/ICS1
OF DEVICES CAN EXECUTE
SECOND ORDER ACTIONS
AND CONTROL OVER
SMART DEVICES
USE OF CLOUD IN ICS SOLUTIONS AND
INABILITYTO IDENTIFY OR ACT ON RISK.1
1: A commissioned study conducted by Forrester Consulting on behalf of Fortinet, January 2018
17% OF DEVICES ARE“AWARE”
OFTHEIR SURROUNDINGS
AND CAN ACT UPON
COLLECTED DATA
24% HAVE BASIC DATA COLLECTION SENSORS,
FEEDINGTHAT DATATO A CENTRAL DATA
STORAGE SYSTEM
AND NOTTO EACH OTHER
35%
HASTHE SCADA/ICS ATYOUR ORGANIZATION
EXPERIENCED A SECURITY BREACH?1
HAVE EXPERIENCED A BREACH IN LASTYEAR, AND ALMOST 90%
KNOWTHEY HAVE BEEN BREACHED!
56%
BIG NEWS!
GOVERNMENT AGENCIES
OT NETWORKS COMPLETELY OPENTO OUTSIDEVENDORS
THIRD PARTIES RESPONSIBLE
FOR ORGANIZATION’S IT
FUNCTIONS
17%
COMPLETE ACCESSWITH NO
RESTRICTIONS PROVIDEDTO:
BUSINESS PARTNERS
21%
16% OF FIRMS OUTSOURCE AT LEAST SOME
FUNCTION OFTHEIR ORGANIZATION’S
SCADA/ICS
56%
SECURITY BREACH
BETWEEN 6 MONTHSTO
LESSTHAN 12 MONTHS
AGO
30%
38%
SECURITY BREACH
BETWEEN 1YEARTO
LESSTHAN 2YEARS
AGO
19%
21%
20182016
ANDTHE BREACHING
IS GETTINGWORSE!
54
%
AT LEAST
HAVE SEEN A HIGH/CRITICAL IMPACT ON A RANGE OF AREAS FROM ABILITYTO
MEET COMPLIANCE AND DECREASED FUNCTIONALITYTO EMPLOYEE SAFETY
IoT IS A GROWINGTREND IN OT SPACESWITH
LOTS OF DIFFERENT KINDS OF DEVICES SHOWING
UP ONTHE NETWORK.1
ON AVERAGE, FIRMS
HAVE
4.7 TECH CONNECTEDTO
THEIR NETWORK
100 % HAVE IoTTECHNOLOGIES
CONNECTEDTOTHEIR ORG’S
NETWORK
FORTINET IS KNOWN AS A LEADING
VENDOR OF OT SOLUTIONS1
VENDORS KNOWN FOR OT CYBER SECURITY SOLUTIONS
FORTINET
GE
25%
23%
22%
20%
CYBERX
HONEYWELL-NEXTNINE
IBM PAS
AND ARETAKING CONCRETE STEPSTO IMPLEMENT
OR IMPROVE SECURITY ON A NUMBER OF ATTACK POINTS.
WHILE OT SECURITY IS A PROBLEM...
OT OPERATORS
ARE AWARE OF IT
19%
31%
HOW DOYOU EXPECTYOUR ORGANIZATION’S SCADA/ICS SECURITY
WILL SPEND INTHE FOLLOWING AREASTO CHANGE FROM 2016TO
27%
11%REMAINTHE SAME
INCREASE BY LESSTHAN
5%
INCREASE BETWEEN 5%
and 10%
INCREASE BY MORE
THAN 10%
77%INCREASE

More Related Content

What's hot (20)

Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google Apps
Elastica Inc.
 
Protecting Your Data In Office 365
Protecting Your Data In Office 365Protecting Your Data In Office 365
Protecting Your Data In Office 365
Elastica Inc.
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security Strategies
Cisco Security
 
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
VMware
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
Omar Khawaja
 
“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security
Ahmed Banafa
 
Enabling Dropbox for Business
Enabling Dropbox for BusinessEnabling Dropbox for Business
Enabling Dropbox for Business
Elastica Inc.
 
Limitless xdr meetup
Limitless xdr meetupLimitless xdr meetup
Limitless xdr meetup
Daliya Spasova
 
Survival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient OrganizationSurvival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient Organization
Tripwire
 
Mobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested RealityMobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested Reality
Zimperium
 
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityDebunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust Security
Centrify Corporation
 
Should You Be Automating
Should You Be AutomatingShould You Be Automating
Should You Be Automating
Siemplify
 
Protect your company from zero-day with ESET Dynamic Threat Defense
Protect your company from zero-day with ESET Dynamic Threat DefenseProtect your company from zero-day with ESET Dynamic Threat Defense
Protect your company from zero-day with ESET Dynamic Threat Defense
Adi Saputra
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
AlgoSec
 
Medical Devices Under Attack
Medical Devices Under Attack Medical Devices Under Attack
Medical Devices Under Attack
Medigate
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
Prime Infoserv
 
Seen at InfoSec Europe 2015: Spot your Snowden!
Seen at InfoSec Europe 2015: Spot your Snowden!Seen at InfoSec Europe 2015: Spot your Snowden!
Seen at InfoSec Europe 2015: Spot your Snowden!
John Wallix
 
An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...
Max Justice
 
Top Threats Facing Organizations Cloud / SaaS Data
Top Threats Facing Organizations Cloud / SaaS DataTop Threats Facing Organizations Cloud / SaaS Data
Top Threats Facing Organizations Cloud / SaaS Data
SysCloud
 
What You Need to Know About Intelligent Network Segmentation
What You Need to Know About Intelligent Network SegmentationWhat You Need to Know About Intelligent Network Segmentation
What You Need to Know About Intelligent Network Segmentation
Medigate
 
Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google Apps
Elastica Inc.
 
Protecting Your Data In Office 365
Protecting Your Data In Office 365Protecting Your Data In Office 365
Protecting Your Data In Office 365
Elastica Inc.
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security Strategies
Cisco Security
 
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
VMware
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
Omar Khawaja
 
“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security
Ahmed Banafa
 
Enabling Dropbox for Business
Enabling Dropbox for BusinessEnabling Dropbox for Business
Enabling Dropbox for Business
Elastica Inc.
 
Survival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient OrganizationSurvival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient Organization
Tripwire
 
Mobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested RealityMobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested Reality
Zimperium
 
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityDebunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust Security
Centrify Corporation
 
Should You Be Automating
Should You Be AutomatingShould You Be Automating
Should You Be Automating
Siemplify
 
Protect your company from zero-day with ESET Dynamic Threat Defense
Protect your company from zero-day with ESET Dynamic Threat DefenseProtect your company from zero-day with ESET Dynamic Threat Defense
Protect your company from zero-day with ESET Dynamic Threat Defense
Adi Saputra
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
AlgoSec
 
Medical Devices Under Attack
Medical Devices Under Attack Medical Devices Under Attack
Medical Devices Under Attack
Medigate
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
Prime Infoserv
 
Seen at InfoSec Europe 2015: Spot your Snowden!
Seen at InfoSec Europe 2015: Spot your Snowden!Seen at InfoSec Europe 2015: Spot your Snowden!
Seen at InfoSec Europe 2015: Spot your Snowden!
John Wallix
 
An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...
Max Justice
 
Top Threats Facing Organizations Cloud / SaaS Data
Top Threats Facing Organizations Cloud / SaaS DataTop Threats Facing Organizations Cloud / SaaS Data
Top Threats Facing Organizations Cloud / SaaS Data
SysCloud
 
What You Need to Know About Intelligent Network Segmentation
What You Need to Know About Intelligent Network SegmentationWhat You Need to Know About Intelligent Network Segmentation
What You Need to Know About Intelligent Network Segmentation
Medigate
 

Similar to Forrester Research on OT Cybersecurity (20)

Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
TechBiz Forense Digital
 
IoT Slam Healthcare 12-02-2016
IoT Slam Healthcare 12-02-2016 IoT Slam Healthcare 12-02-2016
IoT Slam Healthcare 12-02-2016
Great Bay Software
 
Računalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidenteRačunalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidente
Damir Delija
 
Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco's 2016 Annual Security report
Cisco's 2016 Annual Security report
Cisco Canada
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
Nozomi Networks
 
Anti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewskiAnti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewski
Stonesoft
 
IDS Research
IDS ResearchIDS Research
IDS Research
Yehan Gunaratne
 
THE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidanceTHE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity Guidance
Pam Gilmore
 
Data Integrity Protection
Data Integrity ProtectionData Integrity Protection
Data Integrity Protection
proitsolutions
 
LIS3353 SP12 Week 9
LIS3353 SP12 Week 9LIS3353 SP12 Week 9
LIS3353 SP12 Week 9
Amanda Case
 
Best of Positive Research 2013
Best of Positive Research 2013Best of Positive Research 2013
Best of Positive Research 2013
qqlan
 
The FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
The FDA - Mobile, and Fixed Medical Devices Cybersecurity GuidanceThe FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
The FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
Valdez Ladd MBA, CISSP, CISA,
 
Perimeter Security is Failing
Perimeter Security is FailingPerimeter Security is Failing
Perimeter Security is Failing
UL Transaction Security
 
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
sandhibhide
 
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
eFax Corporate®
 
Government-ForeScout-Solution-Brief
Government-ForeScout-Solution-BriefGovernment-ForeScout-Solution-Brief
Government-ForeScout-Solution-Brief
Jonathan Reyes
 
The State of Threat Detection 2019
The State of Threat Detection 2019The State of Threat Detection 2019
The State of Threat Detection 2019
Fidelis Cybersecurity
 
A6704d01
A6704d01A6704d01
A6704d01
mudigonda
 
L11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptxL11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptx
StevenTharp2
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
IoT Slam Healthcare 12-02-2016
IoT Slam Healthcare 12-02-2016 IoT Slam Healthcare 12-02-2016
IoT Slam Healthcare 12-02-2016
Great Bay Software
 
Računalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidenteRačunalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidente
Damir Delija
 
Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco's 2016 Annual Security report
Cisco's 2016 Annual Security report
Cisco Canada
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
Nozomi Networks
 
Anti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewskiAnti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewski
Stonesoft
 
THE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidanceTHE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity Guidance
Pam Gilmore
 
Data Integrity Protection
Data Integrity ProtectionData Integrity Protection
Data Integrity Protection
proitsolutions
 
LIS3353 SP12 Week 9
LIS3353 SP12 Week 9LIS3353 SP12 Week 9
LIS3353 SP12 Week 9
Amanda Case
 
Best of Positive Research 2013
Best of Positive Research 2013Best of Positive Research 2013
Best of Positive Research 2013
qqlan
 
The FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
The FDA - Mobile, and Fixed Medical Devices Cybersecurity GuidanceThe FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
The FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
Valdez Ladd MBA, CISSP, CISA,
 
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
sandhibhide
 
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
eFax Corporate®
 
Government-ForeScout-Solution-Brief
Government-ForeScout-Solution-BriefGovernment-ForeScout-Solution-Brief
Government-ForeScout-Solution-Brief
Jonathan Reyes
 
L11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptxL11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptx
StevenTharp2
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 

More from Fortinet (12)

Fortinet's Secure SD-WAN: Gartner Peer Insights Reviews
Fortinet's Secure SD-WAN: Gartner Peer Insights ReviewsFortinet's Secure SD-WAN: Gartner Peer Insights Reviews
Fortinet's Secure SD-WAN: Gartner Peer Insights Reviews
Fortinet
 
FortiClient Fabric Agent Trial
FortiClient Fabric Agent TrialFortiClient Fabric Agent Trial
FortiClient Fabric Agent Trial
Fortinet
 
Why Partners Who Charge for Technical Assessments Have Higher Growth and Profit
Why Partners Who Charge for Technical Assessments Have Higher Growth and ProfitWhy Partners Who Charge for Technical Assessments Have Higher Growth and Profit
Why Partners Who Charge for Technical Assessments Have Higher Growth and Profit
Fortinet
 
The What and Why of PBM and OML
The What and Why of PBM and OML The What and Why of PBM and OML
The What and Why of PBM and OML
Fortinet
 
The Importance of Targeting your Customers - Cross Selling Execution
The Importance of Targeting your Customers - Cross Selling ExecutionThe Importance of Targeting your Customers - Cross Selling Execution
The Importance of Targeting your Customers - Cross Selling Execution
Fortinet
 
Fortinet Connected UTM
Fortinet Connected UTMFortinet Connected UTM
Fortinet Connected UTM
Fortinet
 
Fortinet Icon Library
Fortinet Icon LibraryFortinet Icon Library
Fortinet Icon Library
Fortinet
 
Securing the Internet of Things 2017
Securing the Internet of Things 2017Securing the Internet of Things 2017
Securing the Internet of Things 2017
Fortinet
 
Infographic: Fortinet Q1 2017 Threat Landscape Report
Infographic: Fortinet Q1 2017 Threat Landscape ReportInfographic: Fortinet Q1 2017 Threat Landscape Report
Infographic: Fortinet Q1 2017 Threat Landscape Report
Fortinet
 
Protecting Higher Education Data
Protecting Higher Education DataProtecting Higher Education Data
Protecting Higher Education Data
Fortinet
 
Q4 Threat Report 2016
Q4 Threat Report 2016Q4 Threat Report 2016
Q4 Threat Report 2016
Fortinet
 
Infographic Protecting Patient Data
Infographic  Protecting Patient Data Infographic  Protecting Patient Data
Infographic Protecting Patient Data
Fortinet
 
Fortinet's Secure SD-WAN: Gartner Peer Insights Reviews
Fortinet's Secure SD-WAN: Gartner Peer Insights ReviewsFortinet's Secure SD-WAN: Gartner Peer Insights Reviews
Fortinet's Secure SD-WAN: Gartner Peer Insights Reviews
Fortinet
 
FortiClient Fabric Agent Trial
FortiClient Fabric Agent TrialFortiClient Fabric Agent Trial
FortiClient Fabric Agent Trial
Fortinet
 
Why Partners Who Charge for Technical Assessments Have Higher Growth and Profit
Why Partners Who Charge for Technical Assessments Have Higher Growth and ProfitWhy Partners Who Charge for Technical Assessments Have Higher Growth and Profit
Why Partners Who Charge for Technical Assessments Have Higher Growth and Profit
Fortinet
 
The What and Why of PBM and OML
The What and Why of PBM and OML The What and Why of PBM and OML
The What and Why of PBM and OML
Fortinet
 
The Importance of Targeting your Customers - Cross Selling Execution
The Importance of Targeting your Customers - Cross Selling ExecutionThe Importance of Targeting your Customers - Cross Selling Execution
The Importance of Targeting your Customers - Cross Selling Execution
Fortinet
 
Fortinet Connected UTM
Fortinet Connected UTMFortinet Connected UTM
Fortinet Connected UTM
Fortinet
 
Fortinet Icon Library
Fortinet Icon LibraryFortinet Icon Library
Fortinet Icon Library
Fortinet
 
Securing the Internet of Things 2017
Securing the Internet of Things 2017Securing the Internet of Things 2017
Securing the Internet of Things 2017
Fortinet
 
Infographic: Fortinet Q1 2017 Threat Landscape Report
Infographic: Fortinet Q1 2017 Threat Landscape ReportInfographic: Fortinet Q1 2017 Threat Landscape Report
Infographic: Fortinet Q1 2017 Threat Landscape Report
Fortinet
 
Protecting Higher Education Data
Protecting Higher Education DataProtecting Higher Education Data
Protecting Higher Education Data
Fortinet
 
Q4 Threat Report 2016
Q4 Threat Report 2016Q4 Threat Report 2016
Q4 Threat Report 2016
Fortinet
 
Infographic Protecting Patient Data
Infographic  Protecting Patient Data Infographic  Protecting Patient Data
Infographic Protecting Patient Data
Fortinet
 

Recently uploaded (20)

SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Kualitatem’s Cybersecurity Risk Assessment
Kualitatem’s Cybersecurity Risk AssessmentKualitatem’s Cybersecurity Risk Assessment
Kualitatem’s Cybersecurity Risk Assessment
Kualitatem Inc
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
"PHP and MySQL CRUD Operations for Student Management System"
"PHP and MySQL CRUD Operations for Student Management System""PHP and MySQL CRUD Operations for Student Management System"
"PHP and MySQL CRUD Operations for Student Management System"
Jainul Musani
 
Automation Dreamin': Capture User Feedback From Anywhere
Automation Dreamin': Capture User Feedback From AnywhereAutomation Dreamin': Capture User Feedback From Anywhere
Automation Dreamin': Capture User Feedback From Anywhere
Lynda Kane
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Dead Pixel: A Practical Guide to Attacking Server-Side Image Processors (BSid...
Dead Pixel: A Practical Guide to Attacking Server-Side Image Processors (BSid...Dead Pixel: A Practical Guide to Attacking Server-Side Image Processors (BSid...
Dead Pixel: A Practical Guide to Attacking Server-Side Image Processors (BSid...
neexemil
 
Hands On: Create a Lightning Aura Component with force:RecordData
Hands On: Create a Lightning Aura Component with force:RecordDataHands On: Create a Lightning Aura Component with force:RecordData
Hands On: Create a Lightning Aura Component with force:RecordData
Lynda Kane
 
Buckeye Dreamin 2024: Assessing and Resolving Technical Debt
Buckeye Dreamin 2024: Assessing and Resolving Technical DebtBuckeye Dreamin 2024: Assessing and Resolving Technical Debt
Buckeye Dreamin 2024: Assessing and Resolving Technical Debt
Lynda Kane
 
Presentation Session 5 Transition roadmap.pdf
Presentation Session 5 Transition roadmap.pdfPresentation Session 5 Transition roadmap.pdf
Presentation Session 5 Transition roadmap.pdf
Mukesh Kala
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Collab Space by SIB (Simple Is Beautiful)
Collab Space by SIB (Simple Is Beautiful)Collab Space by SIB (Simple Is Beautiful)
Collab Space by SIB (Simple Is Beautiful)
SipkyJayaPutra
 
Automation Dreamin' 2022: Sharing Some Gratitude with Your Users
Automation Dreamin' 2022: Sharing Some Gratitude with Your UsersAutomation Dreamin' 2022: Sharing Some Gratitude with Your Users
Automation Dreamin' 2022: Sharing Some Gratitude with Your Users
Lynda Kane
 
#AdminHour presents: Hour of Code2018 slide deck from 12/6/2018
#AdminHour presents: Hour of Code2018 slide deck from 12/6/2018#AdminHour presents: Hour of Code2018 slide deck from 12/6/2018
#AdminHour presents: Hour of Code2018 slide deck from 12/6/2018
Lynda Kane
 
Automation Hour 1/28/2022: Capture User Feedback from Anywhere
Automation Hour 1/28/2022: Capture User Feedback from AnywhereAutomation Hour 1/28/2022: Capture User Feedback from Anywhere
Automation Hour 1/28/2022: Capture User Feedback from Anywhere
Lynda Kane
 
ICT IS FOR LIFE-LONG LEARNING AND TEACHER PROFESSIONAL DEVELOPMENT
ICT IS FOR LIFE-LONG LEARNING AND TEACHER PROFESSIONAL DEVELOPMENTICT IS FOR LIFE-LONG LEARNING AND TEACHER PROFESSIONAL DEVELOPMENT
ICT IS FOR LIFE-LONG LEARNING AND TEACHER PROFESSIONAL DEVELOPMENT
falakzehra17
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
THE FUTURE OF REAL ESTATE: EXPLORING THE METAVERSE
THE FUTURE OF REAL ESTATE: EXPLORING THE METAVERSETHE FUTURE OF REAL ESTATE: EXPLORING THE METAVERSE
THE FUTURE OF REAL ESTATE: EXPLORING THE METAVERSE
Abhiwan Technology
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Kualitatem’s Cybersecurity Risk Assessment
Kualitatem’s Cybersecurity Risk AssessmentKualitatem’s Cybersecurity Risk Assessment
Kualitatem’s Cybersecurity Risk Assessment
Kualitatem Inc
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
"PHP and MySQL CRUD Operations for Student Management System"
"PHP and MySQL CRUD Operations for Student Management System""PHP and MySQL CRUD Operations for Student Management System"
"PHP and MySQL CRUD Operations for Student Management System"
Jainul Musani
 
Automation Dreamin': Capture User Feedback From Anywhere
Automation Dreamin': Capture User Feedback From AnywhereAutomation Dreamin': Capture User Feedback From Anywhere
Automation Dreamin': Capture User Feedback From Anywhere
Lynda Kane
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Dead Pixel: A Practical Guide to Attacking Server-Side Image Processors (BSid...
Dead Pixel: A Practical Guide to Attacking Server-Side Image Processors (BSid...Dead Pixel: A Practical Guide to Attacking Server-Side Image Processors (BSid...
Dead Pixel: A Practical Guide to Attacking Server-Side Image Processors (BSid...
neexemil
 
Hands On: Create a Lightning Aura Component with force:RecordData
Hands On: Create a Lightning Aura Component with force:RecordDataHands On: Create a Lightning Aura Component with force:RecordData
Hands On: Create a Lightning Aura Component with force:RecordData
Lynda Kane
 
Buckeye Dreamin 2024: Assessing and Resolving Technical Debt
Buckeye Dreamin 2024: Assessing and Resolving Technical DebtBuckeye Dreamin 2024: Assessing and Resolving Technical Debt
Buckeye Dreamin 2024: Assessing and Resolving Technical Debt
Lynda Kane
 
Presentation Session 5 Transition roadmap.pdf
Presentation Session 5 Transition roadmap.pdfPresentation Session 5 Transition roadmap.pdf
Presentation Session 5 Transition roadmap.pdf
Mukesh Kala
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Collab Space by SIB (Simple Is Beautiful)
Collab Space by SIB (Simple Is Beautiful)Collab Space by SIB (Simple Is Beautiful)
Collab Space by SIB (Simple Is Beautiful)
SipkyJayaPutra
 
Automation Dreamin' 2022: Sharing Some Gratitude with Your Users
Automation Dreamin' 2022: Sharing Some Gratitude with Your UsersAutomation Dreamin' 2022: Sharing Some Gratitude with Your Users
Automation Dreamin' 2022: Sharing Some Gratitude with Your Users
Lynda Kane
 
#AdminHour presents: Hour of Code2018 slide deck from 12/6/2018
#AdminHour presents: Hour of Code2018 slide deck from 12/6/2018#AdminHour presents: Hour of Code2018 slide deck from 12/6/2018
#AdminHour presents: Hour of Code2018 slide deck from 12/6/2018
Lynda Kane
 
Automation Hour 1/28/2022: Capture User Feedback from Anywhere
Automation Hour 1/28/2022: Capture User Feedback from AnywhereAutomation Hour 1/28/2022: Capture User Feedback from Anywhere
Automation Hour 1/28/2022: Capture User Feedback from Anywhere
Lynda Kane
 
ICT IS FOR LIFE-LONG LEARNING AND TEACHER PROFESSIONAL DEVELOPMENT
ICT IS FOR LIFE-LONG LEARNING AND TEACHER PROFESSIONAL DEVELOPMENTICT IS FOR LIFE-LONG LEARNING AND TEACHER PROFESSIONAL DEVELOPMENT
ICT IS FOR LIFE-LONG LEARNING AND TEACHER PROFESSIONAL DEVELOPMENT
falakzehra17
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
THE FUTURE OF REAL ESTATE: EXPLORING THE METAVERSE
THE FUTURE OF REAL ESTATE: EXPLORING THE METAVERSETHE FUTURE OF REAL ESTATE: EXPLORING THE METAVERSE
THE FUTURE OF REAL ESTATE: EXPLORING THE METAVERSE
Abhiwan Technology
 

Forrester Research on OT Cybersecurity

  • 1. FORRESTER RESEARCH ON OT CYBERSECURITY www.fortinet.com CONVERGENCE OF OT AND IT IS HAPPENING- AND OPENING UP OT SYSTEMSTO IT-STYLE CYBER ATTACKS!1 SECURITY BREACHES HAVE INCREASED INTHE PASTYEAR1 OVER 90% HAVE SEEN SOME LEVEL OF IMPACT FROM A SECURITY BREACHTO THEIR SCADA/ICS1 OF DEVICES CAN EXECUTE SECOND ORDER ACTIONS AND CONTROL OVER SMART DEVICES USE OF CLOUD IN ICS SOLUTIONS AND INABILITYTO IDENTIFY OR ACT ON RISK.1 1: A commissioned study conducted by Forrester Consulting on behalf of Fortinet, January 2018 17% OF DEVICES ARE“AWARE” OFTHEIR SURROUNDINGS AND CAN ACT UPON COLLECTED DATA 24% HAVE BASIC DATA COLLECTION SENSORS, FEEDINGTHAT DATATO A CENTRAL DATA STORAGE SYSTEM AND NOTTO EACH OTHER 35% HASTHE SCADA/ICS ATYOUR ORGANIZATION EXPERIENCED A SECURITY BREACH?1 HAVE EXPERIENCED A BREACH IN LASTYEAR, AND ALMOST 90% KNOWTHEY HAVE BEEN BREACHED! 56% BIG NEWS! GOVERNMENT AGENCIES OT NETWORKS COMPLETELY OPENTO OUTSIDEVENDORS THIRD PARTIES RESPONSIBLE FOR ORGANIZATION’S IT FUNCTIONS 17% COMPLETE ACCESSWITH NO RESTRICTIONS PROVIDEDTO: BUSINESS PARTNERS 21% 16% OF FIRMS OUTSOURCE AT LEAST SOME FUNCTION OFTHEIR ORGANIZATION’S SCADA/ICS 56% SECURITY BREACH BETWEEN 6 MONTHSTO LESSTHAN 12 MONTHS AGO 30% 38% SECURITY BREACH BETWEEN 1YEARTO LESSTHAN 2YEARS AGO 19% 21% 20182016 ANDTHE BREACHING IS GETTINGWORSE! 54 % AT LEAST HAVE SEEN A HIGH/CRITICAL IMPACT ON A RANGE OF AREAS FROM ABILITYTO MEET COMPLIANCE AND DECREASED FUNCTIONALITYTO EMPLOYEE SAFETY IoT IS A GROWINGTREND IN OT SPACESWITH LOTS OF DIFFERENT KINDS OF DEVICES SHOWING UP ONTHE NETWORK.1 ON AVERAGE, FIRMS HAVE 4.7 TECH CONNECTEDTO THEIR NETWORK 100 % HAVE IoTTECHNOLOGIES CONNECTEDTOTHEIR ORG’S NETWORK FORTINET IS KNOWN AS A LEADING VENDOR OF OT SOLUTIONS1 VENDORS KNOWN FOR OT CYBER SECURITY SOLUTIONS FORTINET GE 25% 23% 22% 20% CYBERX HONEYWELL-NEXTNINE IBM PAS AND ARETAKING CONCRETE STEPSTO IMPLEMENT OR IMPROVE SECURITY ON A NUMBER OF ATTACK POINTS. WHILE OT SECURITY IS A PROBLEM... OT OPERATORS ARE AWARE OF IT 19% 31% HOW DOYOU EXPECTYOUR ORGANIZATION’S SCADA/ICS SECURITY WILL SPEND INTHE FOLLOWING AREASTO CHANGE FROM 2016TO 27% 11%REMAINTHE SAME INCREASE BY LESSTHAN 5% INCREASE BETWEEN 5% and 10% INCREASE BY MORE THAN 10% 77%INCREASE