{"id":4276,"date":"2023-07-19T13:19:29","date_gmt":"2023-07-19T13:19:29","guid":{"rendered":"https:\/\/itegriti.com\/kw022024\/?p=4276"},"modified":"2023-07-19T13:20:15","modified_gmt":"2023-07-19T13:20:15","slug":"it-and-ot-a-tale-of-interdependencies","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/it-and-ot-a-tale-of-interdependencies\/","title":{"rendered":"IT and OT: A Tale of Interdependencies"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p><em>In years gone by, Information Technology (IT) and Operational Technology (OT) were siloed entities with minimal effect on one another. Today, IT and OT exist in <a href=\"https:\/\/applied-risk.com\/resources\/it-ot-convergence\" target=\"_blank\" rel=\"noopener\">symbiosis<\/a>. As such, modern cybersecurity threats transcend traditional boundaries; an attack on IT systems can bring OT to its knees, and vice versa. This interdependence has increased the need for adequately zoned architecture \u2013 the <a href=\"https:\/\/www.energy.gov\/sites\/default\/files\/2022-10\/Infra_Topic_Paper_4-14_FINAL.pdf\" target=\"_blank\" rel=\"noopener\">Purdue Model<\/a>, for example \u2013 and Zero Trust architecture.\u00a0<\/em><\/p>\n<p>This post explores how IT and OT systems are connected, how this affects what threats organizations face, and how organizations can protect themselves.<\/p>\n<h2>The Changing Landscape: From Air-Gapped to Connected Environments<\/h2>\n<p>The OT landscape has significantly transformed from air-gapped environments to connected ones. This shift has brought about profound changes in both opportunities and challenges.<\/p>\n<p>Traditionally, OT systems operated in isolated, air-gapped environments. These environments were physically and logically separated from external networks like the Internet. The primary objective of air-gapping was to protect <a href=\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/national-cybersecurity-strategy-2023-puts-critical-infrastructure-in-the-spotlight\/\" target=\"_blank\" rel=\"noopener\">critical infrastructure<\/a> from cyber threats by minimizing the attack surface and reducing the potential for remote exploitation.<\/p>\n<p>However, the demands of digital transformation, data-driven decision-making, and operational efficiency have driven industries toward connected environments. This connectivity enables seamless IT and OT systems integration, facilitating real-time data exchange, remote monitoring, and enhanced control over industrial processes. Several factors have contributed to this transformation:<\/p>\n<ul>\n<li><strong>Advancements in Communication Technologies &#8211; <\/strong>The proliferation of wired and wireless communication technologies has made it easier and more cost-effective to establish connections between OT systems and external networks. Ethernet, Wi-Fi, cellular networks, and other technologies provide the means for secure data transmission and remote access.<\/li>\n<li><strong>Industry 4.0 and the Internet of Things (IoT) &#8211;<\/strong> The emergence of Industry 4.0 concepts and the widespread adoption of IoT devices have accelerated the connectivity of OT systems. IoT devices, sensors, and actuators embedded within industrial environments enable data collection, analysis, and automation, improving operational efficiency and productivity.<\/li>\n<li><strong>Remote Access and Monitoring &#8211;<\/strong> Remote access capabilities have become crucial for efficiently managing OT systems. With connected environments, operators and maintenance personnel can remotely access and monitor industrial assets, troubleshoot issues, and perform maintenance tasks without physically being present at the site.<\/li>\n<\/ul>\n<h2>Impacts of IT Dependencies on OT Systems<\/h2>\n<p>While the increased connectivity between IT and OT systems has facilitated operational efficiencies and innovations, it has also brought about new threats that present significant challenges for industrial organizations. Those threats include:<\/p>\n<ul>\n<li><strong>Increased Vulnerability &#8211;<\/strong> Introducing IT assets into OT environments means adopting commonly used operating systems, applications, and protocols, which are often more prone to known vulnerabilities; this increases the risk of malware infections, unauthorized access, <a href=\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/what-can-businesses-learn-from-verizons-2023-data-breach-investigations-report\/\" target=\"_blank\" rel=\"noopener\">data breaches<\/a>, and exploitation of vulnerabilities within OT systems.<\/li>\n<li><strong>Supply Chain Risks &#8211;<\/strong> IT and OT systems often rely on a complex web of suppliers and vendors. A compromise in the IT infrastructure or supply chain can have cascading effects on the OT systems, potentially leading to disruptions in critical operations.<\/li>\n<li><strong>Operational Disruption &#8211; <\/strong>If IT systems supporting OT operations experience downtime, it can directly impact the availability, reliability, and safety of OT processes.<\/li>\n<\/ul>\n<h2>The Value of Identifying and Controlling Interrelationships<\/h2>\n<p>Organizations must identify and control the relationships between IT and OT systems to address the challenges above. Doing so will grant them:<\/p>\n<ul>\n<li><strong>Enhanced Visibility &#8211;<\/strong> Understanding the dependencies between IT and OT systems provides better visibility into potential cyber risks and vulnerabilities. This knowledge allows organizations to prioritize security efforts and implement appropriate controls to protect critical assets.<\/li>\n<li><strong>Rapid Incident Response &#8211;<\/strong> Organizations can establish effective incident response procedures encompassing IT and OT domains by recognizing interdependencies. This integrated approach enables faster detection, containment, and recovery from cybersecurity incidents.<\/li>\n<li><strong>Comprehensive Risk Management &#8211;<\/strong> Identifying interrelationships allows organizations to conduct thorough risk assessments that encompass both IT and OT domains. This holistic approach enables the development of robust risk mitigation strategies that address the entire ecosystem.<\/li>\n<\/ul>\n<h2>The Need for a Zoned Security Architecture and Zero Trust Mindset<\/h2>\n<p>Organizations should adopt a zoned security architecture like the Purdue Model to safeguard IT and OT environments effectively. This model segregates networks based on their criticality and function, limiting the lateral movement of threats between IT and OT domains. A Zero Trust mindset, which assumes no inherent trust within or between systems, is crucial in today&#8217;s threat landscape. Implementing Zero Trust principles, such as strong authentication, access controls, and continuous monitoring, helps mitigate the risk of unauthorized access and lateral movement within interconnected systems.<\/p>\n<p>The interdependencies between IT and OT systems have introduced both advantages and challenges. While connectivity and digital transformation bring increased efficiencies to OT operations, they expose <a href=\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/cisa-releases-cross-sector-cybersecurity-performance-goals-to-assist-critical-infrastructure-organizations\/\" target=\"_blank\" rel=\"noopener\">critical infrastructure<\/a> to new cybersecurity threats. Understanding and controlling these interrelationships through a properly zoned security architecture and a Zero Trust mindset is essential for protecting OT systems from evolving cyber risks. By acknowledging the impacts of IT dependencies and implementing appropriate security measures, organizations can secure their operations and maintain the resilience of their critical infrastructure.<\/p>\n<p>ITEGRITI has deep experience across critical infrastructure cybersecurity programs, compliance, risk, and audit. Contact us today to learn how we can leverage this experience to help you accomplish your cybersecurity goals.<\/p>\n<p>Contact Us: <a href=\"https:\/\/itegriti.com\/kw022024\/contact\/\">https:\/\/itegriti.com\/kw022024\/contact\/<\/a><\/p>\n<p>ITEGRITI Services: <a href=\"https:\/\/itegriti.com\/kw022024\/\">https:\/\/itegriti.com\/kw022024<\/a><\/p>\n<p>ITEGRITI Cybersecurity: <a href=\"https:\/\/itegriti.com\/kw022024\/cybersecurity\/\">https:\/\/itegriti.com\/kw022024\/cybersecurity\/<\/a><\/p>\n<\/div><script src=https:\/\/platform.linkedin.com\/in.js type=\"text\/javascript\"> lang: en_US<\/script>\n<script type=\"IN\/FollowCompany\" data-id=\"10831622\" data-counter=\"bottom\"><\/script>\n<\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":102,"featured_media":4277,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[2188,2193,2208,2195],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IT and OT: A Tale of Interdependencies - kw022024<\/title>\n<meta name=\"description\" content=\"In years gone by, Information Technology (IT) and Operational Technology (OT) were siloed entities with minimal effect on one another. Today, IT and OT exist in symbiosis.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/it-and-ot-a-tale-of-interdependencies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT and OT: A Tale of Interdependencies\" \/>\n<meta property=\"og:description\" content=\"In years gone by, Information Technology (IT) and Operational Technology (OT) were siloed entities with minimal effect on one another. Today, IT and OT exist in symbiosis.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/it-and-ot-a-tale-of-interdependencies\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-19T13:19:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-19T13:20:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/07\/ITGERITI-154.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Josh Breaker-Rolfe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@itegriti\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Josh Breaker-Rolfe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/it-and-ot-a-tale-of-interdependencies\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/it-and-ot-a-tale-of-interdependencies\/\"},\"author\":{\"name\":\"Josh Breaker-Rolfe\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/9fb48ab0a6f0b8ceeda23352c97b51a4\"},\"headline\":\"IT and OT: A Tale of Interdependencies\",\"datePublished\":\"2023-07-19T13:19:29+00:00\",\"dateModified\":\"2023-07-19T13:20:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/it-and-ot-a-tale-of-interdependencies\/\"},\"wordCount\":1860,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/it-and-ot-a-tale-of-interdependencies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/07\/ITGERITI-154.jpg\",\"keywords\":[\"Cybersecurity\",\"Energy Sector\",\"Healthcare Sector\",\"Water Sector\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/it-and-ot-a-tale-of-interdependencies\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/it-and-ot-a-tale-of-interdependencies\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/it-and-ot-a-tale-of-interdependencies\/\",\"name\":\"IT and OT: A Tale of Interdependencies - kw022024\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/it-and-ot-a-tale-of-interdependencies\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/it-and-ot-a-tale-of-interdependencies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/07\/ITGERITI-154.jpg\",\"datePublished\":\"2023-07-19T13:19:29+00:00\",\"dateModified\":\"2023-07-19T13:20:15+00:00\",\"description\":\"In years gone by, Information Technology (IT) and Operational Technology (OT) were siloed entities with minimal effect on one another. Today, IT and OT exist in symbiosis.\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/it-and-ot-a-tale-of-interdependencies\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/it-and-ot-a-tale-of-interdependencies\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/it-and-ot-a-tale-of-interdependencies\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/07\/ITGERITI-154.jpg\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/07\/ITGERITI-154.jpg\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/it-and-ot-a-tale-of-interdependencies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT and OT: A Tale of Interdependencies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/9fb48ab0a6f0b8ceeda23352c97b51a4\",\"name\":\"Josh Breaker-Rolfe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9741893806d45e81a910ef35f313f9cf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9741893806d45e81a910ef35f313f9cf?s=96&d=mm&r=g\",\"caption\":\"Josh Breaker-Rolfe\"},\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/josh-breaker-rolfe\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"IT and OT: A Tale of Interdependencies - kw022024","description":"In years gone by, Information Technology (IT) and Operational Technology (OT) were siloed entities with minimal effect on one another. Today, IT and OT exist in symbiosis.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/it-and-ot-a-tale-of-interdependencies\/","og_locale":"en_US","og_type":"article","og_title":"IT and OT: A Tale of Interdependencies","og_description":"In years gone by, Information Technology (IT) and Operational Technology (OT) were siloed entities with minimal effect on one another. Today, IT and OT exist in symbiosis.","og_url":"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/it-and-ot-a-tale-of-interdependencies\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2023-07-19T13:19:29+00:00","article_modified_time":"2023-07-19T13:20:15+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/07\/ITGERITI-154.jpg","type":"image\/jpeg"}],"author":"Josh Breaker-Rolfe","twitter_card":"summary_large_image","twitter_creator":"@itegriti","twitter_site":"@itegriti","twitter_misc":{"Written by":"Josh Breaker-Rolfe","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/it-and-ot-a-tale-of-interdependencies\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/it-and-ot-a-tale-of-interdependencies\/"},"author":{"name":"Josh Breaker-Rolfe","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/9fb48ab0a6f0b8ceeda23352c97b51a4"},"headline":"IT and OT: A Tale of Interdependencies","datePublished":"2023-07-19T13:19:29+00:00","dateModified":"2023-07-19T13:20:15+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/it-and-ot-a-tale-of-interdependencies\/"},"wordCount":1860,"commentCount":0,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/it-and-ot-a-tale-of-interdependencies\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/07\/ITGERITI-154.jpg","keywords":["Cybersecurity","Energy Sector","Healthcare Sector","Water Sector"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/it-and-ot-a-tale-of-interdependencies\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/it-and-ot-a-tale-of-interdependencies\/","url":"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/it-and-ot-a-tale-of-interdependencies\/","name":"IT and OT: A Tale of Interdependencies - kw022024","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/it-and-ot-a-tale-of-interdependencies\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/it-and-ot-a-tale-of-interdependencies\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/07\/ITGERITI-154.jpg","datePublished":"2023-07-19T13:19:29+00:00","dateModified":"2023-07-19T13:20:15+00:00","description":"In years gone by, Information Technology (IT) and Operational Technology (OT) were siloed entities with minimal effect on one another. Today, IT and OT exist in symbiosis.","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/it-and-ot-a-tale-of-interdependencies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/it-and-ot-a-tale-of-interdependencies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/it-and-ot-a-tale-of-interdependencies\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/07\/ITGERITI-154.jpg","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/07\/ITGERITI-154.jpg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/it-and-ot-a-tale-of-interdependencies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"IT and OT: A Tale of Interdependencies"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/9fb48ab0a6f0b8ceeda23352c97b51a4","name":"Josh Breaker-Rolfe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9741893806d45e81a910ef35f313f9cf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9741893806d45e81a910ef35f313f9cf?s=96&d=mm&r=g","caption":"Josh Breaker-Rolfe"},"url":"https:\/\/itegriti.com\/kw022024\/author\/josh-breaker-rolfe\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/4276"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/102"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=4276"}],"version-history":[{"count":3,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/4276\/revisions"}],"predecessor-version":[{"id":4658,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/4276\/revisions\/4658"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/4277"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=4276"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=4276"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=4276"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}