<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.viszensecurity.com/blogs/tag/ot/feed" rel="self" type="application/rss+xml"/><title>Viszen Security - Insights #OT</title><description>Viszen Security - Insights #OT</description><link>https://www.viszensecurity.com/blogs/tag/ot</link><lastBuildDate>Sat, 20 Dec 2025 03:38:39 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[NEW Zero Trust Guidance for OT/ICS]]></title><link>https://www.viszensecurity.com/blogs/post/new-zero-trust-guidance-for-ot-ics</link><description><![CDATA[<img align="left" hspace="5" src="https://www.viszensecurity.com/Tue Nov 05 2024.png"/>We co-authored a guide with CSA explaining how to operationalize zero trust in OT/ICS environments, including mapping to existing guidance and frameworks like ISA 62443.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_y63d7UHlQzm4TYmYrVfy6w" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_hCaIM6njTb6TiylAHrepQA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm__tdMnDUrSGqXCu6iPXgHgg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_iW34TbF8RrmexJ9-nxEjAQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">Free resource from Cloud Security Alliance</h2></div>
<div data-element-id="elm_vtCfDzzGTna_SJlel8QRig" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"><span style="font-size:14px;">I'm proud to share the release of a guide we co-authored with the </span><a target="_self" href="https://www.linkedin.com/company/cloud-security-alliance/">Cloud Security Alliance</a><span style="font-size:14px;"> on applying zero trust to OT/ICS and critical infrastructure. <br/><br/>Zero Trust Guidance for Critical Infrastructure</span></span></p><p><span style="color:inherit;"><span style="font-size:14px;">Applying Zero Trust to Operational Technology (OT) and Industrial Control Systems (ICS) Environments<br/>🔗&nbsp;<a href="https://cloudsecurityalliance.org/artifacts/zero-trust-guidance-for-critical-infrastructure">https://cloudsecurityalliance.org/artifacts/zero-trust-guidance-for-critical-infrastructure</a></span><span style="font-size:14px;"><br/><br/>You can download this resource (free) from CSA.<br/><br/>This was definitely a labor of love by all involved. When CSA proposed this, I had one condition: I wanted to make it real and actionable—no fluff. No page after page of confusing abstract buzzwords. <br/><br/>This document provides engineers and architects with a clear, adaptable 5-step process for applying zero trust in OT, aligning IT skills with OT demands.</span></span></p><p><span style="color:inherit;"><span style="font-size:14px;"><br/></span></span></p><p><span style="color:inherit;"><span style="font-size:14px;">Visit the link above at CSA's Zero Trust portal and create a free account to download the full document or it's accompanying (shorter) presentation deck.&nbsp;<br/><br/></span></span><span style="color:inherit;"><img src="/Tue%20Nov%2005%202024.png" alt="" style="width:240px !important;height:306px !important;max-width:100% !important;">&nbsp;</span></p><p><span style="color:inherit;"><img src="/Tue%20Nov%2005%202024-1.png" alt="" style="width:403.67px !important;height:226px !important;max-width:100% !important;"></span></p><p><span style="color:inherit;"><br/></span></p><p><span style="color:inherit;">If you're a CISO or CIO responsible for security OT/ICS environments, you'll love this resource.&nbsp;<br/><br/></span></p><p><span style="color:inherit;">And, <span style="font-weight:bold;">if your organization is interested in learning more about integrating OT/ICS into your security program,</span><a href="/contact" title="contact us" rel="">contact us</a> for advisory services and/or corporate training for your team.&nbsp;<br/><br/></span></p></div>
</div><div data-element-id="elm_XEG32kaFSAWDU1GdO7b5Fw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 05 Nov 2024 10:56:58 -0500</pubDate></item></channel></rss>