Skip to content

De-risk IT/OT convergence: build automated workflows for configuration compliance

Learn best practices to identify and reduce misconfigurations in your converged IT/OT environments

Learn how to:
  • Evaluate security and network device configurations to identify potential misconfiguration
  • Continuously monitor configurations over time
  • Set configuration benchmarks and policies in place to maintain secure configurations

Part three of our exclusive four-part demo hour series; learn how you can eliminate security blind spots, reduce risk and drive compliance with regulatory frameworks across your IT/OT networks.

Infrastructure misconfigurations are very common and can lead to the introduction of new attack vectors and exploitable assets. Misconfigurations are often caused by a difference in deployment personnel, no defined build standards, or disjointed processes for deploying infrastructure within OT.

Skybox can help organizations baseline configuration standards across their infrastructure. This allows organizations to measure configuration compliance against a defined set of industry standards or best practices. As a result, organizations have the assurance that their OT infrastructure has been deployed safely and securely, thereby reducing security risk.

This demonstration covers a range of topics, including:
  • How misconfiguration can often go undetected and unknowingly lead to heightened level of risk
  • How continuous monitoring and analysis of configurations ensures changes are aways detected
  • How to measure risk and impact of a device-misconfiguration, helping to prioritise remediation
Presented by:
Technical Director Skybox Security
Aligned with the Purdue Enterprise Reference Architecture, this four-part demo hour series will walk through different use case to show how organisations can eliminate security blind spots, reduce risk and drive compliance with regulatory frameworks across their IT/OT networks.
Senior Product Marketing Manager Skybox Security
John Stevenson is an industry veteran with over 29 years of experience in cybersecurity. An educator, writer, broadcaster, and marketer, John has led multi-million-pound projects for the implementation of cybersecurity education and best practice. He has managed the Critical Infrastructure groups at Skybox Security, Forcepoint, and Deep Secure and has worked with Gartner, Citrix, and IBM. John’s career spans the UK, Europe, the US, Japan, and the Middle East, helping build security solutions for some of the most security-conscious organizations in the world.