CA-CYOLO
21.2.2024 14:31:29 CET | Business Wire | Press release
Today, Cyolo, the access company for the digital enterprise, in partnership with Ponemon Institute, released a global study exploring how organizations that operate critical infrastructure, industrial control systems (ICS), and other operational technology (OT) systems are managing access and risk in an era of rising connectivity.
“Our world has become increasingly interconnected, and the findings of this report highlight the vital need for organizations to reevaluate and enhance their strategies for ensuring secure access into OT environments,” said Larry Ponemon, Chairman and Founder of the Ponemon Institute.
The report, “Managing Access & Risk in the Increasingly Connected Operational Technology (OT) Environment,” reveals that many industrial organizations lack the resources, expertise, and collaborative processes to effectively mitigate threats and ensure secure access to OT systems. The report is based on a survey of 1,056 security professionals across the United States and EMEA who work in organizations that run an OT environment and are knowledgeable about their organization’s approach to managing OT security and risk.
Ensuring secure access to OT environments is about more than just cybersecurity. These environments contain highly sensitive systems and critical infrastructure responsible for keeping manufacturing lines running, water and electricity flowing, and performing other tasks vital to the smooth functioning of our communities.
OT systems were historically isolated for security reasons but are now facing increased connectivity to IT networks and the internet (sometimes called IT/OT convergence). At the same time, more third-party vendors and contractors are being given remote access to OT environments. These shifts introduce serious new risks that can leave organizations exposed to safety and security threats if access and connectivity are not properly controlled.
Overall key findings include:
- Organizations allow dozens of third-party users to access OT environments. 73% permit third-party access to OT environments, with an average of 77 third parties per organization granted such access. Challenges to securing third-party access include preventing unauthorized access (44%), aligning IT and OT security priorities (43%), and giving users too much privileged access (35 percent).
- Visibility into industrial assets is dismal. 73% lack an authoritative OT asset inventory, putting organizations at significant risk.
- IT and OT teams share responsibility for OT security but do not communicate enough to achieve optimal outcomes. 71% report that IT or IT and OT together are responsible for securing OT environments. However, collaboration and communication are lacking, with 37% reporting little or no collaboration, and 19% reporting that teams talk about OT security issues only when an incident occurs.
- Security is seen not only as a goal of IT/OT convergence but also as an obstacle. Reducing security risk is the top objective of companies pursuing IT/OT convergence (59%), and yet one-third (33%) of organizations not pursuing convergence cite security risk as a top factor for their decision.
“We are at a crucial point in the evolution of OT security, and the need to secure access to critical systems from internal and external threats is more urgent than ever. The stakes are exceptionally high, as a breach could jeopardize not just data but also the functioning of critical infrastructure, risking the safety of workers and the environment,” said Joe O'Donnell, Executive Vice President of Corporate Development and General Manager of OT at Cyolo. “This research reveals a pressing need for new approaches, especially in areas like third-party and privileged access, the security of legacy systems, and collaboration between IT and OT teams. Cyolo is dedicated to supporting organizations in navigating these challenges and working towards a secure, resilient future for OT environments.”
Access the full report here.
Register to attend a joint webinar from Cyolo and Ponemon Institute, on Tuesday, March 12 at 11am ET here: Behind the Ponemon Report: Risk & Access Management in the OT Environment.
During this session Dr. Larry Ponemon will share top insights from the research, with industry analysis added by Cyolo’s Joe O’Donnell and Adi Karisik, Global Principal for OT Cybersecurity at Jacobs Engineering.
About Cyolo
Cyolo enables privileged remote operations by connecting verified identities directly to applications with continuous authorization throughout the connection. Purpose-built for deployment in every type of environment, Cyolo’s Remote Privileged Access Management (RPAM) solution combines multiple security functions required to mitigate high risk access, including zero-trust access for users and devices, MFA for the last mile, IdP capabilities, credentials vault, secure file transfer, supervised access, session recording, and much more into a single, cost-effective, easy to deploy, and user-friendly platform.
Consolidate your security stack and experience the power of seamless and secure operations across any application in any environment, from critical infrastructure to cloud. Visit https://cyolo.io/ to learn more.
About Ponemon Institute
Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations. We uphold strict data confidentiality, privacy and ethical research standards. We do not collect any personally identifiable information from individuals (or company identifiable information in our business research). Furthermore, we have strict quality standards to ensure that subjects are not asked extraneous, irrelevant or improper questions.
To view this piece of content from cts.businesswire.com, please give your consent at the top of this page.
View source version on businesswire.com: https://www.businesswire.com/news/home/20240221222283/en/
About Business Wire
Subscribe to releases from Business Wire
Subscribe to all the latest releases from Business Wire by registering your e-mail address below. You can unsubscribe at any time.
Latest releases from Business Wire
IFF Completed the Divestiture of Soy Crush, Concentrates and Lecithin Businesses2.3.2026 22:15:00 CET | Press release
IFF (NYSE: IFF) today announced that it has successfully completed the previously announced divestiture of its soy crush, concentrates and lecithin businesses to Bunge. This transaction does not include IFF’s soy isolates business. Welcome to IFF At IFF (NYSE: IFF), we make joy through science, creativity and heart. As the global leader in taste, scent, food ingredients, health and biosciences, we’re innovating for the future. Every day, we deliver groundbreaking, sustainable solutions that elevate products people love — advancing wellness, delighting the senses and enhancing the human experience. Learn more at iff.com, LinkedIn, Instagram and Facebook. © 2026 by International Flavors & Fragrances Inc. IFF is a Registered Trademark. All Rights Reserved. View source version on businesswire.com: https://www.businesswire.com/news/home/20260302231096/en/
Verimatrix ReAccess Earns Gold 2026 Merit Award for Telecom & Wireless2.3.2026 17:50:00 CET | Press release
Regulatory News: Verimatrix (Euronext Paris: VMX), a leading provider of security solutions for a safer connected world, today announced that its Verimatrix ReAccess solution was honored with a gold 2026 Merit Award for Telecom & Wireless. The industry accolade recognizes the company’s next-generation content security solution that modernizes legacy Conditional Access Systems (CAS) across DVB, IPTV and OTT networks without requiring costly hardware replacements or field service interventions. Judged by industry executives, media professionals and technology consultants, the Merit Awards evaluate submissions from across the telecommunications landscape. Verimatrix ReAccess enables secure, over-the-air (OTA) software updates to deployed set-top boxes (STBs), delivering operator cost savings, reduced operational complexity, and ongoing protection against piracy. It also empowers operators to continuously strengthen content security, eliminating the need for costly hardware replacements. U
Textron Aviation Launches Donation Campaign to Support 2026 Special Olympics Airlift; Continues Nationwide Call for Volunteer Doves2.3.2026 17:00:00 CET | Press release
Textron Aviation Inc., a Textron Inc. (NYSE: TXT) company, today announced the launch of a donation campaign benefitting Special Olympics in support of the 2026 Special Olympics Airlift, a nationwide effort that brings athletes and coaches to the Special Olympics USA Games through the generosity of volunteer pilots, aircraft owners and operators known as Doves. Financial contributions go directly to the Special Olympics, a 501(c)(3) charitable organization. New for the 2026 event, the donation campaign serves a vital role in ensuring each delegation has what it needs for a smooth and welcoming travel experience. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20260302196418/en/ Textron Aviation launches donation campaign to support 2026 Special Olympics Airlift; continues nationwide call for volunteer Doves (Photo credit: Textron Aviation). “This campaign reflects the spirit of unity and generosity that defines the Special Olym
Forrester Announces The Agenda For Its 2026 CX Events To Help Address The Challenges AI Can’t Handle Alone2.3.2026 15:30:00 CET | Press release
The global event series will bring together customer experience, marketing, and digital business leaders at CX Forum East, CX Forum West, and CX Summit EMEA Forrester (Nasdaq: FORR) today announced the agenda for its global customer experience (CX) event series: CX Summit EMEA, being held in Amsterdam, June 8–10, 2026; CX Forum East, being held in New York City, June 16–17, 2026; and CX Forum West, being held in San Francisco, June 29–30, 2026. Today, CX, marketing, and digital business leaders are under mounting pressure to leverage AI to architect smarter end-to-end customer journeys, automate service, operationalize AI agents, and deliver true personalization at scale — all while consumer trust is at an all-time low. While AI is promising to raise the bar for speed and efficiency, beneath every customer experience is a foundation that AI alone can’t build. To forge trust, organizations need to embed human creativity, context, customer identity, and quality data into every customer i
Incode First to Achieve iBeta’s Highest Level of Independent Identity Security Testing on Both iOS and Android With 0% Error Rate2.3.2026 15:00:00 CET | Press release
Records 0% APCER and 0% BPCER under ISO/IEC 30107-3 Level 3 testing - delivered through a fully passive single-selfie experience Incode Technologies, Inc., the global leader in identity security and fraud prevention, today announced that iBeta PAD testing confirmed Incode’s face liveness technology achieves Level 3 Presentation Attack Detection (PAD) conformance under ISO/IEC 30107-3. "We are the first company to independently achieve iBeta Level 3 conformance on both iOS and Android – with zero errors and without adding friction to users," said Ricardo Amper, Founder & CEO at Incode. "That combination matters. It proves we can meet the highest bar for liveness assurance while keeping onboarding fast and easy, even in regulated and high-risk environments." Face liveness technology is used in digital onboarding and authentication to confirm a real, live person is present during a selfie capture – not a printed photo, video replay, mask, or other spoofing attempt. It enables organization
In our pressroom you can read all our latest releases, find our press contacts, images, documents and other relevant information about us.
Visit our pressroom
