{"id":3941,"date":"2024-03-28T12:45:42","date_gmt":"2024-03-28T11:45:42","guid":{"rendered":"https:\/\/thesitsgroup.com\/2024\/03\/28\/management-von-cyber-sicherheitsrisiken-im-industriellen-iot-und-ot\/"},"modified":"2024-07-11T14:45:41","modified_gmt":"2024-07-11T12:45:41","slug":"management-of-cyber-security-risks-in-industrial-iot-and-ot","status":"publish","type":"post","link":"https:\/\/sits.friendventure.dev\/en\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/","title":{"rendered":"Management of cyber security risks in industrial IoT and OT"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row][vc_column]<h1  class=\"h1 smx-headline \">The IoT world is expanding and so are the security threats<\/h1>[vc_column_text]The Internet of Things (IoT) is changing the world of business. Manufacturers are increasingly integrating advanced technologies such as cloud computing, data analysis and machine learning into their production workflows. The potential value created by IoT is already huge and continues to grow. <a href=\"https:\/\/www.mckinsey.com\/de\/news\/news\/report-internet-der-dinge-iot-wertpotenzial-bis-2030\" target=\"_blank\" rel=\"noopener\">McKinsey<\/a> estimates that the IoT value creation rate could reach USD 12.5 billion worldwide by 2030. Highly specialized economic sectors in particular are currently experiencing the greatest benefits. From applications in medical technology, logistics and transport to solutions for smart factories, IoT is leading the way for a broader digital transformation that generates, stores, analyzes and transmits huge amounts of data across an ever-growing global network.[\/vc_column_text][vc_column_text]According to Palo Alto Networks, the rapid development and introduction of <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/infographics\/state-of-enterprise-iot-security-in-2020\" target=\"_blank\" rel=\"noopener\">IoT technology<\/a> is already transforming business processes. IoT devices probably already account for more than 30 percent of all devices in corporate networks today. The data collected from these devices provides a wealth of valuable information that enables real-time decision making and the build-up of accurate predictive models. In addition, the Internet of Things is a key enabler of digital transformation in organizations and has the potential to increase employee productivity, business efficiency, profitability and improve the overall workforce experience.[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<h2  class=\"h2 smx-headline \">IoT security is becoming increasingly important - also for cyber criminals<\/h2>[vc_column_text]The downside: Linking production facilities (Operational Technology = OT) with IoT technologies and other advanced solutions offers new targets for cyber attacks. After all, billions of networked devices create all kinds of potential vulnerabilities in companies. According to McKinsey, increasing connectivity has drastically increased the number of attack vectors. Before IoT, a large corporate network may have had to consider up to <a href=\"https:\/\/www.mckinsey.de\/~\/media\/McKinsey\/Featured%20Insights\/Internet%20of%20Things\/Our%20Insights\/Six%20ways%20CEOs%20can%20promote%20cybersecurity%20in%20the%20IoT%20age\/How-CEOs-can-tackle-the-challenge-of-cybersecurity-in-the-age-of-the-Internet-of-Things.pdf\" target=\"_blank\" rel=\"noopener\">500,000 vulnerable endpoints<\/a>, whereas IoT can involve millions or even several million such points.[\/vc_column_text][vc_column_text]A recent report by Asimily entitled \"<a href=\"https:\/\/asimily.com\/iot-device-security-in-2024-the-high-cost-of-doing-nothing\/\" target=\"_blank\" rel=\"noopener\">IoT Device Security in 2024<\/a>: The High Cost of Doing Nothing\" shows just how big the threat posed by the use of IoT devices actually is. It analyzes emerging attack trends targeting IoT infrastructures and outlines possible consequences for companies that do not take adequate security measures. According to the report, already known vulnerabilities are among the biggest threats: 34 of the 39 most frequently used IoT vulnerabilities have been known for more than three years on average. Routers account for 75 percent of infected IoT devices, as they serve as gateways for accessing other nodes in a network. Security cameras, digital signage systems, medical devices and industrial control systems are also among the most frequently attacked devices.[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<h2  class=\"h2 smx-headline \">Risks relating to the use of IoT in companies<\/h2>[vc_column_text]Depending on the application, a security breach in an industrial IoT environment poses various risks. Starting with the disclosure of important information that is crucial for the operation of the company or the manufacture of a product, through damage to industrial control systems to the compromise of manufactured products. An example: An attacker gains access to the network of an auto-industry supplier and manipulates the machine settings of a brake component without being noticed. This can lead to the brakes suddenly failing under load. Both the material and immaterial damage to the company is almost impossible to quantify.[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<h3  class=\"h3 smx-headline \">IoT is prone to vulnerabilities<\/h3>[vc_column_text]Industrial IoT architecture refers to the collection of all IoT elements in smart factories. Although it differs from company to company, it always includes devices with sensors and actuators, network elements, databases, analysis tools and business applications. Each component poses specific security risks to the entire production environment.<\/p>\n<p>As <a href=\"https:\/\/www.paloaltonetworks.com\/cybersecurity-perspectives\/expanding-iot-visibility\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks<\/a> explains, without resilient security, any networked IoT device is vulnerable to intrusion, compromise and control by malicious actors who break into the system, steal user data and crash systems. As more and more different IoT devices connect to the network, the attack surface increases dramatically. As a result, overall network security is decreasing in terms of the integrity and protection of the least secure device. Additionally to these challenges, 98 percent of all traffic from IoT devices is mostly unencrypted, putting confidential data at high risk.<\/p>\n<p>Various attacks on industrial IoT aim to compromise the security of different elements of the IoT ecosystem, such as network communications, IoT and OT software and applications, and physical devices. DDoS, device hijacking or spoofing and man in the middle attacks are just some of the security issues in this context. The consequences of a single cyber attack vary depending on the target, but the most common and dangerous is the disclosure of sensitive data. The table shows the most common IoT attacks and their impact on OT factories.[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<h3  class=\"h3 smx-headline \">IoT attack risks at a glance<\/h3>[vc_column_text]<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"201\"><\/td>\n<td style=\"text-align: left;\" width=\"201\"><strong>Attacks<\/strong><\/td>\n<td style=\"text-align: left;\" width=\"201\"><strong>Effects<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"201\"><strong>Hardware<\/strong><\/td>\n<td width=\"201\">\n<ul>\n<li>Reverse engineering<\/li>\n<li>Physical tampering<\/li>\n<li>RF jamming<\/li>\n<li>Denial-of-sleep attack<\/li>\n<li>Side-channel attacks<\/li>\n<li>Counterfeit hardware<\/li>\n<\/ul>\n<\/td>\n<td width=\"201\">\n<ul>\n<li>Access to sensitive information<\/li>\n<li>Data flow control<\/li>\n<li>Resource destruction<\/li>\n<\/ul>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td width=\"201\">&nbsp;<\/p>\n<p>&nbsp;<\/td>\n<td width=\"201\"><\/td>\n<td width=\"201\"><\/td>\n<\/tr>\n<tr>\n<td width=\"201\"><strong>Software<\/strong><\/td>\n<td width=\"201\">\n<ul>\n<li>Malware, Ransomware, Spyware<\/li>\n<li>Bot\/botnets<\/li>\n<li>Blended threats<\/li>\n<li>Rootkits<\/li>\n<li>Forced deadlock<\/li>\n<li>Exploitation of trusted identifiers<\/li>\n<li>Code injection<\/li>\n<li>Brute-force attacks<\/li>\n<li>SQL injections<\/li>\n<\/ul>\n<\/td>\n<td width=\"201\">\n<ul>\n<li>Disclosure of sensitive data<\/li>\n<li>Interruption of data<\/li>\n<li>Software rendered unusable<\/li>\n<li>Blocking access to files<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"201\">&nbsp;<\/p>\n<p>&nbsp;<\/td>\n<td width=\"201\"><\/td>\n<td width=\"201\"><\/td>\n<\/tr>\n<tr>\n<td width=\"201\"><strong>Communications<\/strong><\/td>\n<td width=\"201\">\n<ul>\n<li>DoS\/DDoS attacks<\/li>\n<li>Eavesdropping (sniffing and spoofing attacks)<\/li>\n<li>Man-in-the-middle attacks<\/li>\n<li>Session hijacking<\/li>\n<li>DNS tunneling<\/li>\n<li>Port scanning<\/li>\n<li>Protocol manipulation attacks<\/li>\n<li>Jamming<\/li>\n<li>Traffic analysis<\/li>\n<li>Sinkhole attacks<\/li>\n<\/ul>\n<\/td>\n<td width=\"201\">\n<ul>\n<li>Network flooding and overload<\/li>\n<li>Data theft<\/li>\n<li>Unauthorized access to databases<\/li>\n<li>System crashes<\/li>\n<li>Malware tunneling<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<h2  class=\"h2 smx-headline \">Achieving security in the IoT<\/h2>[vc_column_text]IoT devices are dedicated objects that perform a limited number of actions. For example, they establish a connection to a network and transmit and receive data. Typical examples of IoT devices in companies include barcode scanners, smart light bulbs and security cameras as well as measurement and control sensors. IoT devices differ from IT devices such as computers in that they generally only have one specific task. In addition, many do not support software updates and security patches. If a vulnerability is found in software or firmware, it is difficult to protect them from exploitation and compromise. Another difference is that IoT devices often also appear unnoticed in a network. In addition, their unique network behavior is problematic for administrators who are more accustomed to managing laptops and desktops due to their specialized design. For these reasons, it is mandatory that all organizations evolve their cyber security measures and take proactive steps to address this increasingly complex IoT\/OT threat landscape.[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<h3  class=\"h3 smx-headline \">The key IoT security safeguards<\/h3>[vc_column_text]The following actions from the SITS IoT security checklist are essential to implement an effective security strategy and mitigate the risks associated with IoT\/OT threats:<\/p>\n<ul>\n<li>Implement zero trust architecture<\/li>\n<li>Maintain an overview of all devices<\/li>\n<li>Proactively identify vulnerabilities<\/li>\n<li>Check all data traffic<\/li>\n<li>Set up real-time monitoring<\/li>\n<li>Ensure regular updates<\/li>\n<li>Detect outdated devices<\/li>\n<li>Perform security risk assessment<\/li>\n<li>Establish an industrial demilitarized zone (IDMZ)<\/li>\n<\/ul>\n<p>[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<h2  class=\"h2 smx-headline \">Conclusion IoT Security<\/h2>[vc_column_text]The introduction of IoT and OT devices offers companies significant benefits, but also poses major risks. A modern zero-trust approach is required to efficiently and securely manage IoT and OT devices at scale. Managers must also consider cybersecurity at all organizational levels by introducing security policies, implementing protection mechanisms and training their employees. If you are looking for a reliable partner to advise and support you in protecting your IoT systems, SITS is here to help.[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text]The Internet of Things (IoT) is changing the world of business. Manufacturers are increasingly integrating advanced technologies such as cloud computing, data analysis and machine learning into their production workflows. The potential value created by IoT is already huge and continues to grow. McKinsey estimates that the IoT value creation rate could reach USD 12.5 [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":5430,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[185],"tags":[],"class_list":["post-3941","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-defense-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Industrial IoT and OT: security management<\/title>\n<meta name=\"description\" content=\"Cyber security risks in industrial IoT and OT \u25b6 The right strategies for risk mitigation \u25b6 Best practices \u2713 Find out now!\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Industrial IoT and OT: security management\" \/>\n<meta property=\"og:description\" content=\"Cyber security risks in industrial IoT and OT \u25b6 The right strategies for risk mitigation \u25b6 Best practices \u2713 Find out now!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sits.friendventure.dev\/en\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/\" \/>\n<meta property=\"og:site_name\" content=\"SITS\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-28T11:45:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-11T12:45:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"805\" \/>\n\t<meta property=\"og:image:height\" content=\"1435\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ilackinger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ilackinger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/\"},\"author\":{\"name\":\"ilackinger\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#\/schema\/person\/1c8a57badeeb21935ae47de41016610d\"},\"headline\":\"Management of cyber security risks in industrial IoT and OT\",\"datePublished\":\"2024-03-28T11:45:42+00:00\",\"dateModified\":\"2024-07-11T12:45:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/\"},\"wordCount\":1360,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2.jpg\",\"articleSection\":[\"Cyber Defense\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/sits.friendventure.dev\/en\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/\",\"url\":\"https:\/\/sits.friendventure.dev\/en\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/\",\"name\":\"Industrial IoT and OT: security management\",\"isPartOf\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2.jpg\",\"datePublished\":\"2024-03-28T11:45:42+00:00\",\"dateModified\":\"2024-07-11T12:45:41+00:00\",\"description\":\"Cyber security risks in industrial IoT and OT \u25b6 The right strategies for risk mitigation \u25b6 Best practices \u2713 Find out now!\",\"breadcrumb\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sits.friendventure.dev\/en\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/#primaryimage\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2.jpg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2.jpg\",\"width\":805,\"height\":1435},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/sits.friendventure.dev\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Management of cyber security risks in industrial IoT and OT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#website\",\"url\":\"https:\/\/sits.friendventure.dev\/en\/\",\"name\":\"SITS\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sits.friendventure.dev\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#organization\",\"name\":\"SITS\",\"url\":\"https:\/\/sits.friendventure.dev\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"width\":557,\"height\":322,\"caption\":\"SITS\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#\/schema\/person\/1c8a57badeeb21935ae47de41016610d\",\"name\":\"ilackinger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4374b5318c3e575f35b3cfa5e1c98e1d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4374b5318c3e575f35b3cfa5e1c98e1d?s=96&d=mm&r=g\",\"caption\":\"ilackinger\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Industrial IoT and OT: security management","description":"Cyber security risks in industrial IoT and OT \u25b6 The right strategies for risk mitigation \u25b6 Best practices \u2713 Find out now!","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"Industrial IoT and OT: security management","og_description":"Cyber security risks in industrial IoT and OT \u25b6 The right strategies for risk mitigation \u25b6 Best practices \u2713 Find out now!","og_url":"https:\/\/sits.friendventure.dev\/en\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/","og_site_name":"SITS","article_published_time":"2024-03-28T11:45:42+00:00","article_modified_time":"2024-07-11T12:45:41+00:00","og_image":[{"width":805,"height":1435,"url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2.jpg","type":"image\/jpeg"}],"author":"ilackinger","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ilackinger","Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sits.friendventure.dev\/en\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/#article","isPartOf":{"@id":"https:\/\/sits.friendventure.dev\/en\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/"},"author":{"name":"ilackinger","@id":"https:\/\/sits.friendventure.dev\/en\/#\/schema\/person\/1c8a57badeeb21935ae47de41016610d"},"headline":"Management of cyber security risks in industrial IoT and OT","datePublished":"2024-03-28T11:45:42+00:00","dateModified":"2024-07-11T12:45:41+00:00","mainEntityOfPage":{"@id":"https:\/\/sits.friendventure.dev\/en\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/"},"wordCount":1360,"commentCount":0,"publisher":{"@id":"https:\/\/sits.friendventure.dev\/en\/#organization"},"image":{"@id":"https:\/\/sits.friendventure.dev\/en\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/#primaryimage"},"thumbnailUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2.jpg","articleSection":["Cyber Defense"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sits.friendventure.dev\/en\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sits.friendventure.dev\/en\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/","url":"https:\/\/sits.friendventure.dev\/en\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/","name":"Industrial IoT and OT: security management","isPartOf":{"@id":"https:\/\/sits.friendventure.dev\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sits.friendventure.dev\/en\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/#primaryimage"},"image":{"@id":"https:\/\/sits.friendventure.dev\/en\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/#primaryimage"},"thumbnailUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2.jpg","datePublished":"2024-03-28T11:45:42+00:00","dateModified":"2024-07-11T12:45:41+00:00","description":"Cyber security risks in industrial IoT and OT \u25b6 The right strategies for risk mitigation \u25b6 Best practices \u2713 Find out now!","breadcrumb":{"@id":"https:\/\/sits.friendventure.dev\/en\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sits.friendventure.dev\/en\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/sits.friendventure.dev\/en\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/#primaryimage","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2.jpg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2.jpg","width":805,"height":1435},{"@type":"BreadcrumbList","@id":"https:\/\/sits.friendventure.dev\/en\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/sits.friendventure.dev\/en\/"},{"@type":"ListItem","position":2,"name":"Management of cyber security risks in industrial IoT and OT"}]},{"@type":"WebSite","@id":"https:\/\/sits.friendventure.dev\/en\/#website","url":"https:\/\/sits.friendventure.dev\/en\/","name":"SITS","description":"","publisher":{"@id":"https:\/\/sits.friendventure.dev\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sits.friendventure.dev\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/sits.friendventure.dev\/en\/#organization","name":"SITS","url":"https:\/\/sits.friendventure.dev\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/sits.friendventure.dev\/en\/#\/schema\/logo\/image\/","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","width":557,"height":322,"caption":"SITS"},"image":{"@id":"https:\/\/sits.friendventure.dev\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sits.friendventure.dev\/en\/#\/schema\/person\/1c8a57badeeb21935ae47de41016610d","name":"ilackinger","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/sits.friendventure.dev\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4374b5318c3e575f35b3cfa5e1c98e1d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4374b5318c3e575f35b3cfa5e1c98e1d?s=96&d=mm&r=g","caption":"ilackinger"}}]}},"_links":{"self":[{"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/posts\/3941","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/comments?post=3941"}],"version-history":[{"count":1,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/posts\/3941\/revisions"}],"predecessor-version":[{"id":15788,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/posts\/3941\/revisions\/15788"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/media\/5430"}],"wp:attachment":[{"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/media?parent=3941"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/categories?post=3941"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/tags?post=3941"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}