Contextual metadata ties technical OT asset information to use cases

Contextual metadata ties technical OT asset information to use cases

By Walt Boyes  This is part of a blog series. Please read Part I here.  Our hero has been trying his very best to follow rule number one: you cannot measure what you cannot see, and you cannot protect it either. Unfortunately, and as you might expect if you have been...
Contextual metadata ties technical OT asset information to use cases

Why manual OT asset inventories don’t work

By Walt Boyes  When we last saw our intrepid maintenance lead cybersecurity chief, he was waking up in the middle of the night from dreams of being the little Dutch boy with his fingers in the dike. Now, his manager has told him that because of the worsening economic...
Contextual metadata ties technical OT asset information to use cases

Boyes: No OT vulnerability management without an OT asset inventory

By Walt Boyes  What we know is that we can’t manage OT asset vulnerabilities from the vulnerability side of the equation. We know that doesn’t work, because the vulnerability space is continuously shifting and morphing as even more vulnerabilities are discovered....
Contextual metadata ties technical OT asset information to use cases

Boyes: Taking a hard look at OT threat detection

By Walt Boyes  When you want to control something, you must measure it. You cannot control something you cannot measure. That’s what we do in OT- we measure and then control the variables that are meaningful to the process we manage. There are other variables...