{"id":25408,"date":"2026-04-27T17:22:25","date_gmt":"2026-04-27T15:22:25","guid":{"rendered":"https:\/\/aiotrust.io\/?p=25408"},"modified":"2026-04-27T17:38:13","modified_gmt":"2026-04-27T15:38:13","slug":"aiotrust-joins-the-hexatrust-ecosystem-2","status":"publish","type":"post","link":"https:\/\/aiotrust.io\/en\/aiotrust-joins-the-hexatrust-ecosystem-2\/","title":{"rendered":"OT cybersecurity: the urgent need to secure industrial systems at source"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"25408\" class=\"elementor elementor-25408 elementor-25407\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6e355ca e-flex e-con-boxed e-con e-parent\" data-id=\"6e355ca\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a1439a5 elementor-widget elementor-widget-text-editor\" data-id=\"a1439a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">OT<\/span><b> cybersecurity<\/b><span style=\"font-weight: 400;\"> has become a major challenge for industry. However, in many industrial companies, efforts to <\/span><b>efforts<\/b><span style=\"font-weight: 400;\"> are still<\/span><b> largely focused<\/b><span style=\"font-weight: 400;\"> on<\/span><b> IT systems <\/b><span style=\"font-weight: 400;\">systems (networks, servers, user workstations).<\/span><\/p><p data-start=\"215\" data-end=\"372\"><span style=\"font-weight: 400;\">But what about <\/span><b>industrial equipment, <\/b><span style=\"font-weight: 400;\">PLCs, sensors and production lines? That&#8217;s precisely where most of the risk lies today!<\/span><\/p><p data-start=\"215\" data-end=\"372\"> <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-90472c5 e-flex e-con-boxed e-con e-parent\" data-id=\"90472c5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e4cfa78 elementor-widget elementor-widget-heading\" data-id=\"e4cfa78\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is OT cybersecurity?\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a2e2de elementor-widget elementor-widget-text-editor\" data-id=\"4a2e2de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Operational Technology (OT) cybersecurity refers to all the practices <\/span><b>practices, technologies and measures<\/b><span style=\"font-weight: 400;\"> designed to <\/span><b>industrial systems against cyber threats.<\/b><\/p><p><span style=\"font-weight: 400;\">Unlike IT cybersecurity, which focuses on information systems (servers, networks, workstations), OT cybersecurity directly concerns physical equipment and industrial processes. <\/span><b>equipment and industrial processes.<\/b><\/p><p><span style=\"font-weight: 400;\">In particular, it aims to guarantee :<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">the <\/span><b>continuity<\/b><span style=\"font-weight: 400;\"> of operations<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">integrity of <\/span><b>production processes<\/b><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">safety <\/span><b>installations <\/b><span style=\"font-weight: 400;\">and<\/span><b> people<\/b><\/li><\/ul><div><b> <\/b><\/div><p><span style=\"font-weight: 400;\">In industrial environments, a cyber attack is more than just a data leak or computer downtime. It can have <\/span><b>direct consequences <\/b><span style=\"font-weight: 400;\">on <\/span><b>production, quality and even the physical<\/b><span style=\"font-weight: 400;\"> infrastructure.<\/span><\/p><p><span style=\"font-weight: 400;\"> <\/span><\/p><p><span style=\"font-weight: 400;\">That&#8217;s what makes OT cybersecurity both specific&#8230; and critical.<\/span><\/p><p> <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-de00485 e-flex e-con-boxed e-con e-parent\" data-id=\"de00485\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9eb4ad2 elementor-widget elementor-widget-heading\" data-id=\"9eb4ad2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Understanding the industrial systems (IS) environment<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7569ac9 elementor-widget elementor-widget-text-editor\" data-id=\"7569ac9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">OT environments are based on a specific architecture, designed to <\/span><b>control and supervise <\/b><b>industrial processes.<\/b><\/p><p><span style=\"font-weight: 400;\">There are generally<\/span><span style=\"font-weight: 400;\">several layers:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Visit <\/span><b>sensors and actuators,<\/b><span style=\"font-weight: 400;\"> which interact directly with the physical world<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The <\/span><b>industrial controllers (PLC),<\/b><span style=\"font-weight: 400;\"> which execute commands and control equipment<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The <\/span><b>supervision systems (SCADA),<\/b><span style=\"font-weight: 400;\"> which centralize data and provide global control<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The <\/span><b>ICS (Industrial Control Systems),<\/b><span style=\"font-weight: 400;\"> which encompass all these components<\/span><\/li><\/ul><div> <\/div><div><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-25410 size-full aligncenter\" src=\"https:\/\/aiotrust.io\/wp-content\/uploads\/Article-cybersecurite-OT-1.png\" alt=\"PLC factory cybersecurity OT\" width=\"600\" height=\"400\" srcset=\"https:\/\/aiotrust.io\/wp-content\/uploads\/Article-cybersecurite-OT-1.png 600w, https:\/\/aiotrust.io\/wp-content\/uploads\/Article-cybersecurite-OT-1-300x200.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/div><p><span style=\"font-weight: 400;\">In this architecture<\/span>, data flows from the field to the supervisory systems, via the PLCs which act as intermediaries. Understanding this organization is essential to grasp the challenges of OT cybersecurity&#8230; and its <b>blind spots.<\/b> <\/p><p> <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9779b5e e-flex e-con-boxed e-con e-parent\" data-id=\"9779b5e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f84e89b elementor-widget elementor-widget-heading\" data-id=\"f84e89b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">An explosion in cyberattacks targeting industrial environments<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-181dda7 elementor-widget elementor-widget-text-editor\" data-id=\"181dda7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Between 2021 and 2023, the average number of industrial attacks reported each month will rise from <\/span><b>from 31 to 73, an increase of +53%<\/b><span style=\"font-weight: 400;\"> in just two years (source: CSO Online).<\/span><\/p><p><span style=\"font-weight: 400;\">The figures speak for themselves. The <\/span><b>cyber attackers<\/b><span style=\"font-weight: 400;\"> no longer target IT systems alone. They are now attacking<\/span><b> PLCs <\/b><span style=\"font-weight: 400;\">PLCs, sensors and <\/span><b>sensors and actuators<\/b><span style=\"font-weight: 400;\"> and <\/span><b>control and production systems. <\/b> <\/p><p> <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ffcb596 e-flex e-con-boxed e-con e-parent\" data-id=\"ffcb596\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ce77e46 elementor-widget elementor-widget-heading\" data-id=\"ce77e46\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Invisible EO cyberattacks with real consequences\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b5ed54b elementor-widget elementor-widget-text-editor\" data-id=\"b5ed54b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">In many cases, an OT cyber attack <\/span><b>does not block production<\/b><span style=\"font-weight: 400;\"> with an immediate shutdown. It is more insidious and creates a <\/span><b>slow drift:<\/b><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">a modified order,<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">a falsified sensor value,<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">abnormal but discreet behavior.<\/span><\/li><\/ul><div> <\/div><p><span style=\"font-weight: 400;\">As a result, systems continue to <\/span><b>as if nothing were wrong, <\/b><span style=\"font-weight: 400;\">and dashboards display data that looks coherent, but the physical reality is altered.<\/span><\/p><p><span style=\"font-weight: 400;\"> <\/span><\/p><p><span style=\"font-weight: 400;\">And that&#8217;s what makes IoT cybersecurity so complex. <\/span><b>complex.<\/b><\/p><p> <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4b4c3f9 e-flex e-con-boxed e-con e-parent\" data-id=\"4b4c3f9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e37bd86 elementor-widget elementor-widget-heading\" data-id=\"e37bd86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">A structural flaw in the industrial data chain\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c50b3c elementor-widget elementor-widget-text-editor\" data-id=\"5c50b3c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">In classic industrial architectures, PLCs <\/span><b>play a central role: <\/b><span style=\"font-weight: 400;\">they collect, <\/span><b>filter and transmit data to supervisory control systems <\/b><span style=\"font-weight: 400;\">(SCADA) SYSTEMS.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But this creates a major problem, as IT tools and supervision systems only see data that has already been <\/span><b>already transformed data.<\/b><span style=\"font-weight: 400;\"> They have no visibility of the equipment&#8217;s raw signals.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In fact, if a PLC is compromised,<\/span><b> the data reported may be false,<\/b><span style=\"font-weight: 400;\"> alerts may be absent, and operators may only be able to make an <\/span><b>incorrect reading <\/b><span style=\"font-weight: 400;\">of the situation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><img decoding=\"async\" class=\"alignright wp-image-25412\" src=\"https:\/\/aiotrust.io\/wp-content\/uploads\/Article-cybersecurite-OT-2.png\" alt=\"\" width=\"400\" height=\"267\" srcset=\"https:\/\/aiotrust.io\/wp-content\/uploads\/Article-cybersecurite-OT-2.png 600w, https:\/\/aiotrust.io\/wp-content\/uploads\/Article-cybersecurite-OT-2-300x200.png 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/span><\/p>\n<p style=\"text-align: right;\"><span style=\"font-weight: 400;\">&nbsp;<\/span><\/p>\n<p style=\"text-align: right;\"><span style=\"font-weight: 400;\">&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A case in point is <\/span><b>the attack on Moscollector in Russia,<\/b><span style=\"font-weight: 400;\"> where sensor data was manipulated, giving a false view of the real state of the network.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As the information is biased at source, all subsequent layers become blind.<\/span><\/p>\n<p><\/p>\n<p><span style=\"font-weight: 400;\">&nbsp;<\/span><\/p><p><span style=\"font-weight: 400;\"><br><\/span><\/p><p><span style=\"font-weight: 400;\"><br><\/span><\/p><p><span style=\"font-weight: 400;\"><br><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fb8d04c e-flex e-con-boxed e-con e-parent\" data-id=\"fb8d04c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3fea907 elementor-widget elementor-widget-heading\" data-id=\"3fea907\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">OT cybersecurity: why prevention is no longer enough<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29c8d23 elementor-widget elementor-widget-text-editor\" data-id=\"29c8d23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">According to CISA, <\/span><b>80% of OT attacks originate in IT<\/b><span style=\"font-weight: 400;\">. In other words, even with robust IT cybersecurity, a vulnerability will eventually be exploited. <\/span><b>there is no such thing as zero risk.<\/b><\/p><p><span style=\"font-weight: 400;\">So the question is no longer just: &#8220;How do I prevent an OT attack?<\/span><b>How to prevent an EO attack? <\/b><span style=\"font-weight: 400;\">but rather: &#8220;<\/span><b>How to detect, understand and react quickly to an IoT cyber attack?&#8221;<\/b><\/p><p><span style=\"font-weight: 400;\">This is where the notion of <\/span><b>OT resilience<\/b><span style=\"font-weight: 400;\">.<\/span><\/p><p><span style=\"font-weight: 400;\"> <\/span><\/p><p><span style=\"font-weight: 400;\">Against this backdrop, regulatory <\/span><b>regulatory developments<\/b><span style=\"font-weight: 400;\"> reinforce this approach. The <\/span><b>European directive NIS2, <\/b><span style=\"font-weight: 400;\">which is gradually coming into force, requires industrial players to step up their level of cybersecurity, with particular emphasis on system <\/span><b>system resilience.<\/b><span style=\"font-weight: 400;\"> In concrete terms, this means setting up capabilities for <\/span><b>anomaly detection<\/b><span style=\"font-weight: 400;\"> incident management and <\/span><b>disaster recovery plans (DRP).<\/b><\/p><p> <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a3c6216 e-flex e-con-boxed e-con e-parent\" data-id=\"a3c6216\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3143a40 elementor-widget elementor-widget-heading\" data-id=\"3143a40\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Towards OT cybersecurity based on physical reality<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d83a18 elementor-widget elementor-widget-text-editor\" data-id=\"4d83a18\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\"><img decoding=\"async\" class=\"alignright wp-image-24576\" src=\"https:\/\/aiotrust.io\/wp-content\/uploads\/IMG_6419-1024x1024.jpg\" alt=\"AIoTrust solution in operation\" width=\"500\" height=\"500\" srcset=\"https:\/\/aiotrust.io\/wp-content\/uploads\/IMG_6419-1024x1024.jpg 1024w, https:\/\/aiotrust.io\/wp-content\/uploads\/IMG_6419-300x300.jpg 300w, https:\/\/aiotrust.io\/wp-content\/uploads\/IMG_6419-150x150.jpg 150w, https:\/\/aiotrust.io\/wp-content\/uploads\/IMG_6419-768x768.jpg 768w, https:\/\/aiotrust.io\/wp-content\/uploads\/IMG_6419-1536x1536.jpg 1536w, https:\/\/aiotrust.io\/wp-content\/uploads\/IMG_6419-2048x2048.jpg 2048w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>For <\/span><b>strengthen the cybersecurity and cyberresilience<\/b><span style=\"font-weight: 400;\"> of industrial systems, we need to change our approach. It&#8217;s no longer enough to monitor networks or software.<\/span><\/p><p><span style=\"font-weight: 400;\">You need to observe what&#8217;s actually happening on the equipment, analyze its signals and check command execution.<\/span><\/p><p><span style=\"font-weight: 400;\"> <\/span><\/p><p><span style=\"font-weight: 400;\">The <\/span><b>raw electrical signals<\/b><span style=\"font-weight: 400;\"> (input\/output) are a key source of information for :<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">verify that a command has been executed<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">detect inconsistencies<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">identify abnormal behavior that is invisible elsewhere<\/span><\/li><\/ul><div> <\/div><p><span style=\"font-weight: 400;\">Solutions now exist to <\/span><b>capture these signals directly at source. <\/b><span style=\"font-weight: 400;\">Installed as close as possible to the equipment (e.g. on a DIN rail), they can be used without modifying the existing architecture:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">analyze inputs\/outputs in real time<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">compare order and execution<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">detect anomalies even when PLCs are compromised<\/span><\/li><\/ul><div> <\/div><p><span style=\"font-weight: 400;\">This approach provides <\/span><b>visibility independent<\/b><span style=\"font-weight: 400;\"> from traditional systems.<\/span><\/p><p> <\/p><p><span style=\"font-weight: 400;\"> <\/span><\/p><p><span style=\"font-weight: 400;\"> <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9b12dd8 e-flex e-con-boxed e-con e-parent\" data-id=\"9b12dd8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bb8f253 elementor-widget elementor-widget-heading\" data-id=\"bb8f253\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">OT cybersecurity: the strategic challenge of securing industrial equipment at source.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cac8fca elementor-widget elementor-widget-text-editor\" data-id=\"cac8fca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">OT can no longer be considered a blind spot in cybersecurity. It lies at the heart of production, industrial performance and operational risks. Today <\/span><b>OT cybersecurity<\/b><span style=\"font-weight: 400;\"> is no longer just a technical issue. <\/span><b>It&#8217;s a financial, strategic and systemic issue.<\/b><\/p><p><b> <\/b><\/p><p><span style=\"font-weight: 400;\">Industrial environments are changing fast, and so are the threats they pose. It is necessary to<\/span><b> go to the source of data, observe physical reality and detect anomalies<\/b><span style=\"font-weight: 400;\"> where they appear, <\/span><b>in the equipment itself.<\/b><\/p><p><span style=\"font-weight: 400;\">Only then can manufacturers truly strengthen their resilience in the face of cyber threats.<\/span><\/p><p> <\/p><p> <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-19b6ea0 e-flex e-con-boxed e-con e-parent\" data-id=\"19b6ea0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-17239eb elementor-widget elementor-widget-heading\" data-id=\"17239eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">FAQ - OT cybersecurity\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c654e0b e-flex e-con-boxed e-con e-parent\" data-id=\"c654e0b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-324fce5 e-flex e-con-boxed e-con e-parent\" data-id=\"324fce5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-69b46b2 elementor-widget elementor-widget-n-accordion\" data-id=\"69b46b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1100\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-1100\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What is OT cybersecurity? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1100\" class=\"elementor-element elementor-element-e806768 e-con-full e-flex e-con e-child\" data-id=\"e806768\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1100\" class=\"elementor-element elementor-element-bf85366 e-flex e-con-boxed e-con e-child\" data-id=\"bf85366\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-63030ed elementor-widget elementor-widget-text-editor\" data-id=\"63030ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">OT (Operational Technology) cybersecurity covers all practices designed to protect industrial systems, such as PLCs, sensors or supervision systems, against cyberattacks. Its aim is to guarantee the continuity of operations, the integrity of processes and the safety of installations. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1101\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1101\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What's the difference between IT and OT cybersecurity? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1101\" class=\"elementor-element elementor-element-700d5d9 e-con-full e-flex e-con e-child\" data-id=\"700d5d9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1101\" class=\"elementor-element elementor-element-332f6e0 e-flex e-con-boxed e-con e-child\" data-id=\"332f6e0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-01029b8 elementor-widget elementor-widget-text-editor\" data-id=\"01029b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">IT cybersecurity protects information systems (networks, servers, data), while OT cybersecurity concerns industrial systems and physical equipment. An OT cyber attack can have a direct impact on production, machinery and, in some cases, personal safety. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1102\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1102\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Why has OT cybersecurity become critical? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1102\" class=\"elementor-element elementor-element-97d8ca2 e-con-full e-flex e-con e-child\" data-id=\"97d8ca2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1102\" class=\"elementor-element elementor-element-c393caa e-flex e-con-boxed e-con e-child\" data-id=\"c393caa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cb17b3e elementor-widget elementor-widget-text-editor\" data-id=\"cb17b3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Industrial environments are increasingly connected, making them more vulnerable to cyber threats. What&#8217;s more, attackers now target industrial equipment directly, sometimes invisibly, but with real consequences for operations. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1103\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1103\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What are the main OT cybersecurity risks? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1103\" class=\"elementor-element elementor-element-100812f e-flex e-con-boxed e-con e-child\" data-id=\"100812f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1103\" class=\"elementor-element elementor-element-e5c4d9b e-con-full e-flex e-con e-child\" data-id=\"e5c4d9b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6643d01 elementor-widget elementor-widget-text-editor\" data-id=\"6643d01\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Risks include :<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">modification of industrial orders<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">falsification of sensor data<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">equipment stoppage or damage<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">impacts on production quality<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">risks to plant safety<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1104\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1104\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Why are some OT attacks so difficult to detect? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1104\" class=\"elementor-element elementor-element-b986326 e-flex e-con-boxed e-con e-child\" data-id=\"b986326\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1104\" class=\"elementor-element elementor-element-69c0c20 e-con-full e-flex e-con e-child\" data-id=\"69c0c20\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1075c28 elementor-widget elementor-widget-text-editor\" data-id=\"1075c28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">In conventional industrial architectures, data is filtered by PLCs before being passed on to supervisory systems. If these systems are compromised, they can continue to display consistent information, even if the physical reality is altered. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1105\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"6\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1105\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> How can we improve the cybersecurity of industrial systems? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1105\" class=\"elementor-element elementor-element-751dbd3 e-flex e-con-boxed e-con e-child\" data-id=\"751dbd3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1105\" class=\"elementor-element elementor-element-953a1e7 e-con-full e-flex e-con e-child\" data-id=\"953a1e7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-56374a0 elementor-widget elementor-widget-text-editor\" data-id=\"56374a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Improving OT cybersecurity involves a number of actions:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">secure IT\/OT access and connections<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">strengthen industrial network supervision<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">test systems regularly<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">and, above all, improve visibility close to equipment<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1106\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"7\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1106\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Why is field visibility essential in OT cybersecurity? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1106\" class=\"elementor-element elementor-element-c6371d0 e-flex e-con-boxed e-con e-child\" data-id=\"c6371d0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1106\" class=\"elementor-element elementor-element-b73b51d e-con-full e-flex e-con e-child\" data-id=\"b73b51d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-674bd04 elementor-widget elementor-widget-text-editor\" data-id=\"674bd04\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Good visibility enables you to understand what&#8217;s really happening on your equipment. By accessing unfiltered data, it becomes possible to detect anomalies or discrepancies between commands and their execution, even if traditional systems have been compromised. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>OT cybersecurity has become a major challenge for industry. However, in many industrial companies, efforts to efforts are still largely focused on IT systems systems (networks, servers, user workstations). But what about industrial equipment, PLCs, sensors and production lines? That&#8217;s precisely where most of the risk lies today! What is OT cybersecurity? Operational Technology (OT) [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":25417,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[63],"tags":[64],"class_list":["post-25408","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-expertise-article","tag-expertise-article"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>OT cybersecurity: the urgent need to secure industrial systems at source - AIoTrust<\/title>\n<meta name=\"description\" content=\"AIoTrust is pleased to announce its membership of HEXATRUST, the European reference network for cybersecurity solutions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/aiotrust.io\/en\/aiotrust-joins-the-hexatrust-ecosystem-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OT cybersecurity: the urgent need to secure industrial systems at source - AIoTrust\" \/>\n<meta property=\"og:description\" content=\"AIoTrust is pleased to announce its membership of HEXATRUST, the European reference network for cybersecurity solutions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/aiotrust.io\/en\/aiotrust-joins-the-hexatrust-ecosystem-2\/\" \/>\n<meta property=\"og:site_name\" content=\"AIoTrust\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-27T15:22:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-27T15:38:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/aiotrust.io\/wp-content\/uploads\/Article-cybersecurite-OT.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Elise\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Elise\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/aiotrust.io\\\/en\\\/aiotrust-joins-the-hexatrust-ecosystem-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/aiotrust.io\\\/en\\\/aiotrust-joins-the-hexatrust-ecosystem-2\\\/\"},\"author\":{\"name\":\"Elise\",\"@id\":\"https:\\\/\\\/aiotrust.io\\\/en\\\/#\\\/schema\\\/person\\\/988e9bc76e3eddd6b292134f6e290373\"},\"headline\":\"OT cybersecurity: the urgent need to secure industrial systems at source\",\"datePublished\":\"2026-04-27T15:22:25+00:00\",\"dateModified\":\"2026-04-27T15:38:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/aiotrust.io\\\/en\\\/aiotrust-joins-the-hexatrust-ecosystem-2\\\/\"},\"wordCount\":1421,\"publisher\":{\"@id\":\"https:\\\/\\\/aiotrust.io\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/aiotrust.io\\\/en\\\/aiotrust-joins-the-hexatrust-ecosystem-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/aiotrust.io\\\/wp-content\\\/uploads\\\/Article-cybersecurite-OT.png\",\"keywords\":[\"Expertise article\"],\"articleSection\":[\"Expertise article\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/aiotrust.io\\\/en\\\/aiotrust-joins-the-hexatrust-ecosystem-2\\\/\",\"url\":\"https:\\\/\\\/aiotrust.io\\\/en\\\/aiotrust-joins-the-hexatrust-ecosystem-2\\\/\",\"name\":\"OT cybersecurity: the urgent need to secure industrial systems at source - AIoTrust\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/aiotrust.io\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/aiotrust.io\\\/en\\\/aiotrust-joins-the-hexatrust-ecosystem-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/aiotrust.io\\\/en\\\/aiotrust-joins-the-hexatrust-ecosystem-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/aiotrust.io\\\/wp-content\\\/uploads\\\/Article-cybersecurite-OT.png\",\"datePublished\":\"2026-04-27T15:22:25+00:00\",\"dateModified\":\"2026-04-27T15:38:13+00:00\",\"description\":\"AIoTrust is pleased to announce its membership of HEXATRUST, the European reference network for cybersecurity solutions.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/aiotrust.io\\\/en\\\/aiotrust-joins-the-hexatrust-ecosystem-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/aiotrust.io\\\/en\\\/aiotrust-joins-the-hexatrust-ecosystem-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/aiotrust.io\\\/en\\\/aiotrust-joins-the-hexatrust-ecosystem-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/aiotrust.io\\\/wp-content\\\/uploads\\\/Article-cybersecurite-OT.png\",\"contentUrl\":\"https:\\\/\\\/aiotrust.io\\\/wp-content\\\/uploads\\\/Article-cybersecurite-OT.png\",\"width\":600,\"height\":400,\"caption\":\"Article cybersecurity OT\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/aiotrust.io\\\/en\\\/aiotrust-joins-the-hexatrust-ecosystem-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/aiotrust.io\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"OT cybersecurity: the urgent need to secure industrial systems at source\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/aiotrust.io\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/aiotrust.io\\\/en\\\/\",\"name\":\"AIoTrust\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/aiotrust.io\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/aiotrust.io\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/aiotrust.io\\\/en\\\/#organization\",\"name\":\"AIoTrust\",\"url\":\"https:\\\/\\\/aiotrust.io\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/aiotrust.io\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/aiotrust.io\\\/wp-content\\\/uploads\\\/AIo_Trust_logo.png\",\"contentUrl\":\"https:\\\/\\\/aiotrust.io\\\/wp-content\\\/uploads\\\/AIo_Trust_logo.png\",\"width\":500,\"height\":261,\"caption\":\"AIoTrust\"},\"image\":{\"@id\":\"https:\\\/\\\/aiotrust.io\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/aiotrust.io\\\/en\\\/#\\\/schema\\\/person\\\/988e9bc76e3eddd6b292134f6e290373\",\"name\":\"Elise\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b809837d28889c768e356b5c192664aa4152741669ab3cd24980c991484b985a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b809837d28889c768e356b5c192664aa4152741669ab3cd24980c991484b985a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b809837d28889c768e356b5c192664aa4152741669ab3cd24980c991484b985a?s=96&d=mm&r=g\",\"caption\":\"Elise\"},\"url\":\"https:\\\/\\\/aiotrust.io\\\/en\\\/author\\\/elise\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"OT cybersecurity: the urgent need to secure industrial systems at source - AIoTrust","description":"AIoTrust is pleased to announce its membership of HEXATRUST, the European reference network for cybersecurity solutions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/aiotrust.io\/en\/aiotrust-joins-the-hexatrust-ecosystem-2\/","og_locale":"en_US","og_type":"article","og_title":"OT cybersecurity: the urgent need to secure industrial systems at source - AIoTrust","og_description":"AIoTrust is pleased to announce its membership of HEXATRUST, the European reference network for cybersecurity solutions.","og_url":"https:\/\/aiotrust.io\/en\/aiotrust-joins-the-hexatrust-ecosystem-2\/","og_site_name":"AIoTrust","article_published_time":"2026-04-27T15:22:25+00:00","article_modified_time":"2026-04-27T15:38:13+00:00","og_image":[{"width":600,"height":400,"url":"https:\/\/aiotrust.io\/wp-content\/uploads\/Article-cybersecurite-OT.png","type":"image\/png"}],"author":"Elise","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Elise","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/aiotrust.io\/en\/aiotrust-joins-the-hexatrust-ecosystem-2\/#article","isPartOf":{"@id":"https:\/\/aiotrust.io\/en\/aiotrust-joins-the-hexatrust-ecosystem-2\/"},"author":{"name":"Elise","@id":"https:\/\/aiotrust.io\/en\/#\/schema\/person\/988e9bc76e3eddd6b292134f6e290373"},"headline":"OT cybersecurity: the urgent need to secure industrial systems at source","datePublished":"2026-04-27T15:22:25+00:00","dateModified":"2026-04-27T15:38:13+00:00","mainEntityOfPage":{"@id":"https:\/\/aiotrust.io\/en\/aiotrust-joins-the-hexatrust-ecosystem-2\/"},"wordCount":1421,"publisher":{"@id":"https:\/\/aiotrust.io\/en\/#organization"},"image":{"@id":"https:\/\/aiotrust.io\/en\/aiotrust-joins-the-hexatrust-ecosystem-2\/#primaryimage"},"thumbnailUrl":"https:\/\/aiotrust.io\/wp-content\/uploads\/Article-cybersecurite-OT.png","keywords":["Expertise article"],"articleSection":["Expertise article"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/aiotrust.io\/en\/aiotrust-joins-the-hexatrust-ecosystem-2\/","url":"https:\/\/aiotrust.io\/en\/aiotrust-joins-the-hexatrust-ecosystem-2\/","name":"OT cybersecurity: the urgent need to secure industrial systems at source - AIoTrust","isPartOf":{"@id":"https:\/\/aiotrust.io\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/aiotrust.io\/en\/aiotrust-joins-the-hexatrust-ecosystem-2\/#primaryimage"},"image":{"@id":"https:\/\/aiotrust.io\/en\/aiotrust-joins-the-hexatrust-ecosystem-2\/#primaryimage"},"thumbnailUrl":"https:\/\/aiotrust.io\/wp-content\/uploads\/Article-cybersecurite-OT.png","datePublished":"2026-04-27T15:22:25+00:00","dateModified":"2026-04-27T15:38:13+00:00","description":"AIoTrust is pleased to announce its membership of HEXATRUST, the European reference network for cybersecurity solutions.","breadcrumb":{"@id":"https:\/\/aiotrust.io\/en\/aiotrust-joins-the-hexatrust-ecosystem-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/aiotrust.io\/en\/aiotrust-joins-the-hexatrust-ecosystem-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/aiotrust.io\/en\/aiotrust-joins-the-hexatrust-ecosystem-2\/#primaryimage","url":"https:\/\/aiotrust.io\/wp-content\/uploads\/Article-cybersecurite-OT.png","contentUrl":"https:\/\/aiotrust.io\/wp-content\/uploads\/Article-cybersecurite-OT.png","width":600,"height":400,"caption":"Article cybersecurity OT"},{"@type":"BreadcrumbList","@id":"https:\/\/aiotrust.io\/en\/aiotrust-joins-the-hexatrust-ecosystem-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/aiotrust.io\/en\/"},{"@type":"ListItem","position":2,"name":"OT cybersecurity: the urgent need to secure industrial systems at source"}]},{"@type":"WebSite","@id":"https:\/\/aiotrust.io\/en\/#website","url":"https:\/\/aiotrust.io\/en\/","name":"AIoTrust","description":"","publisher":{"@id":"https:\/\/aiotrust.io\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/aiotrust.io\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/aiotrust.io\/en\/#organization","name":"AIoTrust","url":"https:\/\/aiotrust.io\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/aiotrust.io\/en\/#\/schema\/logo\/image\/","url":"https:\/\/aiotrust.io\/wp-content\/uploads\/AIo_Trust_logo.png","contentUrl":"https:\/\/aiotrust.io\/wp-content\/uploads\/AIo_Trust_logo.png","width":500,"height":261,"caption":"AIoTrust"},"image":{"@id":"https:\/\/aiotrust.io\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/aiotrust.io\/en\/#\/schema\/person\/988e9bc76e3eddd6b292134f6e290373","name":"Elise","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b809837d28889c768e356b5c192664aa4152741669ab3cd24980c991484b985a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b809837d28889c768e356b5c192664aa4152741669ab3cd24980c991484b985a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b809837d28889c768e356b5c192664aa4152741669ab3cd24980c991484b985a?s=96&d=mm&r=g","caption":"Elise"},"url":"https:\/\/aiotrust.io\/en\/author\/elise\/"}]}},"_links":{"self":[{"href":"https:\/\/aiotrust.io\/en\/wp-json\/wp\/v2\/posts\/25408","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aiotrust.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aiotrust.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aiotrust.io\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/aiotrust.io\/en\/wp-json\/wp\/v2\/comments?post=25408"}],"version-history":[{"count":4,"href":"https:\/\/aiotrust.io\/en\/wp-json\/wp\/v2\/posts\/25408\/revisions"}],"predecessor-version":[{"id":25430,"href":"https:\/\/aiotrust.io\/en\/wp-json\/wp\/v2\/posts\/25408\/revisions\/25430"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aiotrust.io\/en\/wp-json\/wp\/v2\/media\/25417"}],"wp:attachment":[{"href":"https:\/\/aiotrust.io\/en\/wp-json\/wp\/v2\/media?parent=25408"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aiotrust.io\/en\/wp-json\/wp\/v2\/categories?post=25408"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aiotrust.io\/en\/wp-json\/wp\/v2\/tags?post=25408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}