Training SOC Teams on OT-Related Cyber Threats

Training SOC Teams on OT-Related Cyber Threats

Security operations center (SOC) teams are wise to consider OT-oriented live fire cyber attack simulation training in 2023.

Training SOC Teams on OT-Related Cyber Threats

by Edward Amoroso, Founder/CEO of Tag Cyber

Original post

We were pleased to see the recent Cloud Range announcement that they will now be supporting live-fire simulations for security operations center (SOC) teams to deal with advanced operational technology (OT) attacks.

Cloud Range CEO Debbie Gordon described the company’s rationale for this new training offering as follows: “Organizations can’t rely on the traditional training and certifications of their IT and OT teams, and they will need to invest in dynamic training content.”

This new focus from Cloud Range addresses serious cyber risk trends that we see at TAG Cyber in OT infrastructure. Specifically, with increased complexity of OT services, and gradual introduction of zero trust access to OT infrastructure, new security methods are needed.

Furthermore, our TAG Cyber research suggests that an increasing number of CISO-led teams are being given management responsibility for OT security, especially in industrial control system (ICS) networks supporting critical and essential services.

Our advice to SOC teams with OT responsibility is that live-fire simulation training should be a priority in 2023, especially if the team has not engaged in such range activity in the past. Such attention will help to reduce the risk of serious attacks to OT systems.

Cloud Range, specifically, has a good reputation for supporting SOC team training, with years of experience helping IT-oriented teams. Their extension to OT infrastructure leverages this experience as well as their existing training platform.

For more information on TAG Cyber research and advisory services, visit our website, where you can download our most recent TAG Cyber Quarterly Report as well as our Fifty to Watch in Cyber Report for 2023.

Previous
Previous

Navigating Your Zero Trust Journey to Stronger Cybersecurity

Next
Next

Is Your Security Team Prepared for an OT Cyber Attack?