NIST 800-82r3 Guide to Operational Technology (OT) Security: A Call to Action for OT Continuous Monitoring

The newly updated NIST 800-82 Rev. 3, published in September 2023, suggests that organizations should implement continuous monitoring as part of their organizational risk management strategy to monitor the effectiveness of protective measures. The NIST guide suggests technical approaches at length, including capabilities for building defensible OT network architectures, and continuously defending those network architectures.

Read this guide to learn about:

  • Key considerations for an OT risk management strategy
  • Security risks and threats to OT operations
  • Which stakeholders are responsible for securing OT operations
  • Best practices for continuous monitoring, including what to monitor
  • How Nozomi Networks helps you implement NIST 800-82
View Resource

Speakers

NIST 800-82r3 Guide to Operational Technology (OT) Security: A Call to Action for OT Continuous Monitoring

NIST 800-82r3 Guide to Operational Technology (OT) Security: A Call to Action for OT Continuous Monitoring

The newly updated NIST 800-82 Rev. 3, published in September 2023, suggests that organizations should implement continuous monitoring as part of their organizational risk management strategy to monitor the effectiveness of protective measures. The NIST guide suggests technical approaches at length, including capabilities for building defensible OT network architectures, and continuously defending those network architectures.

Read this guide to learn about:

  • Key considerations for an OT risk management strategy
  • Security risks and threats to OT operations
  • Which stakeholders are responsible for securing OT operations
  • Best practices for continuous monitoring, including what to monitor
  • How Nozomi Networks helps you implement NIST 800-82

Speakers

NIST 800-82r3 Guide to Operational Technology (OT) Security: A Call to Action for OT Continuous Monitoring

The newly updated NIST 800-82 Rev. 3, published in September 2023, suggests that organizations should implement continuous monitoring as part of their organizational risk management strategy to monitor the effectiveness of protective measures. The NIST guide suggests technical approaches at length, including capabilities for building defensible OT network architectures, and continuously defending those network architectures.

Read this guide to learn about:

  • Key considerations for an OT risk management strategy
  • Security risks and threats to OT operations
  • Which stakeholders are responsible for securing OT operations
  • Best practices for continuous monitoring, including what to monitor
  • How Nozomi Networks helps you implement NIST 800-82

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your IoT and OT asset discovery, inventory, and management.