Applying the New NCSC / CISA Guidance
8 principles for secure OT connectivity
Join us on February 18, 2026, 12 noon New York Time
As 2023 winds down it’s only natural to take stock of what happened and plan to make things better in the new year. For those of us who live and breathe OT or ICS cybersecurity, what better way to end the year than with an in-depth look at the most novel, notorious and impactful cyber incidents on critical infrastructure, industrial controls systems, and physical operations around the globe.
In a webinar on February 18th, Andrew Ginter takes us through:
![]()
Aggressive patching for Internet-exposed and IT-exposed equipment.
![]()
Centralizing dangerous IT and Internet connectivity
![]()
Designing communications to simplify inspection
![]()
Hardening the IT/OT interface with hardware-enforced remote access and unidirectional technologies
![]()
Firewalled micro-segmentation to control lateral movement
![]()
“Browsing down” for engineering workstations
![]()
Managing “break-glass” accounts
![]()
New designs for unidirectional hardware in emergency islanding / isolation scenarios