A CISO’s Guide to Effective Operational Technology (OT) Security Practices

On-Demand Webcast|1 hour

Securing Operational Technology is a challenge for many organizations that depend on the continual availability of ICS/SCADA systems to manufacture their products. For example, maintenance windows for security patches are often hard to find and raise concerns about ““breaking”” systems. Furthermore, OT systems require Internet access and, therefore, are vulnerable to threat actors who are often nation-states. 

In this CISO Stories webinar, panelists share their experiences dealing with the security of OT in their organizations. They will also discuss best practices and tools developed by a cross sector task force of CISOs, highlighting:

  • Gaining senior management support for OT security
  • Organizing an incident response process
  • Improving the security of suppliers providing OT equipment and systems
  • Current and proposed OT security regulations and standards
  • Addressing technical debt
  • Effective security controls and compensating controls

Join us for key insights and tools to help your organization improve the security of your Operational Technology environment.  


Tom Scurrah
VP, Cybersecurity Programs and Content
Cybersecurity Collaborative

For over 20 years, Tom has practiced as a cyber security professional as an executive director of information security for Verizon, a founder of two cyber security consulting firms, and Vice President of Content and Programs for the Cybersecurity Collaborative.

Tom is CEO of MyDataOnly, Inc., which offers privacy and security consultation and security (penetration) testing services. Tom began his career in IT in programming and strategic planning and later founded a customer satisfaction measurement firm.

Tom holds four security certifications (CISSP, CISM, PCIP) and one privacy certification (CIPP/US). He has a master’s degree from MIT’s Sloan School of Management and is a Marine Corps veteran.

Parham Eftekhari
Executive Vice President, Collaboration
CyberRisk Alliance

Parham Eftekhari is a recognized business executive in the information security sector with a lifelong passion for leadership, and community engagement. His expertise spans critical infrastructure technology and policy, business strategy and operations, executive advising, and thought leadership content initiatives.

Parham has published over a dozen information security reports, regularly engages with the media, and has contributed to countless briefings and events at institutions including TEDx, Congress, the World Bank, RSA, IFA+, (ISC)2, C-SPAN, and the Institute for Critical Infrastructure Technology (ICIT).


Arctic Wolf