Security News > 2020 > May > Three Tips to Help CISOs Close the IT-OT Security Gap, Part 2
In Part 1 of this two-part series, I discussed the flaws in trying to apply trusted IT cybersecurity best practices to the Operational Technology environment, and provided the first of three recommendations for how to bridge the IT-OT security gap: eliminate complexity.
The risk of disruption and downtime to implement a new security control, patch or system upgrade is a non-starter for OT teams.
The good news is that most organizations are starting with a blank slate and can design the OT security program without worrying about existing security technology.
The OT security solution you select should take a holistic approach too, meaning it should integrate equally well with your ecosystem of OT and IT systems and workflows.
Eliminate complexity, align IT and OT teams, and simplify governance are my top three recommendations for how to bridge the IT-OT security gap.