{"id":4125,"date":"2026-01-16T05:50:27","date_gmt":"2026-01-16T05:50:27","guid":{"rendered":"http:\/\/ft365.org\/index.php\/2026\/01\/16\/global-agencies-release-new-guidance-to-secure-industrial-networks\/"},"modified":"2026-01-16T05:50:27","modified_gmt":"2026-01-16T05:50:27","slug":"global-agencies-release-new-guidance-to-secure-industrial-networks","status":"publish","type":"post","link":"https:\/\/ft365.org\/index.php\/2026\/01\/16\/global-agencies-release-new-guidance-to-secure-industrial-networks\/","title":{"rendered":"Global Agencies Release New Guidance to Secure Industrial Networks"},"content":{"rendered":"<div id=\"cphContent_pnlArticleBody\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"0\">\n<p>A new set of security principles aimed at protecting operational technology (OT) environments has been released by the US Cybersecurity and Infrastructure Security Agency (CISA), the United Kingdom\u2019s National Cyber Security Centre (NCSC) and the Federal Bureau of Investigation (FBI), alongside international partners.<\/p>\n<p>The guidance addresses growing risks linked to insecure connectivity in systems that underpin essential services,\u00a0outlining\u00a0a shared framework to help organizations design and manage secure connectivity in OT\u00a0environments.<\/p>\n<p>Led by NCSC-UK, the guidance responds to increased interconnection between industrial systems and enterprise networks, a trend that has improved efficiency but expanded the attack surface for cyber threat actors.<\/p>\n<h2>Building More Secure Connectivity in OT Systems<\/h2>\n<p>The document sets out clear goals for building secure connectivity into OT systems from the outset. It focuses on reducing exposure to both highly capable and opportunistic adversaries, including nation state-sponsored actors, by embedding security into network design rather than treating it as an afterthought.<\/p>\n<p>Operational technology networks increasingly support real-time analytics, remote monitoring and predictive maintenance, the guide explains. These benefits, however, come with heightened cyber-risk that could lead to physical harm, environmental damage or service disruption.<\/p>\n<p>\u201cAs operational technology systems benefit from greater connectivity and attract more attention from adversaries, it is vital that cybersecurity is treated as a foundational requirement that supports physical safety outcomes, uptime and service continuity,\u201d said\u00a0NCSC chief technology officer, Ollie Whitehouse.<\/p>\n<p><em>Read more on operational technology cybersecurity: OT Security Ecosystem for Targeted Risk Reduction and Reporting<\/em><\/p>\n<p>Security leaders also say the guidance reflects the growing reality of OT-targeted attacks.<\/p>\n<p>\u201cWith the rise in attacks from groups like China\u2019s Salt Typhoon and Russia\u2019s CARR, protection of operational technology has never been more significant,\u201d explained\u00a0Pete Luban, field CISO at AttackIQ.<\/p>\n<p>He added that this technology is \u201coften the backbone of critical infrastructure like energy generation plants or transportation networks.\u201d<\/p>\n<p>Luban also highlighted adversarial emulation as an additional safeguard.<\/p>\n<p>\u201cTesting cyber defenses against tactics commonly deployed by known threat groups allows security teams to identify where critical vulnerabilities lie and work to patch them before intruders can utilize them against operational technologies,\u201d he concluded.<\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A new set of security principles aimed at protecting operational technology (OT) environments has been released by the US Cybersecurity and Infrastructure Security Agency (CISA), the United Kingdom\u2019s National Cyber Security Centre (NCSC) and the Federal Bureau of Investigation (FBI), alongside international partners. The guidance addresses growing risks linked to insecure connectivity in systems that<\/p>\n","protected":false},"author":2,"featured_media":4126,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-4125","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"featured_image_urls":{"full":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4125-c0d77af7-ea59-41ce-8b82-6af48acbdef3.jpg",300,300,false],"thumbnail":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4125-c0d77af7-ea59-41ce-8b82-6af48acbdef3-150x150.jpg",150,150,true],"medium":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4125-c0d77af7-ea59-41ce-8b82-6af48acbdef3.jpg",300,300,false],"medium_large":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4125-c0d77af7-ea59-41ce-8b82-6af48acbdef3.jpg",300,300,false],"large":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4125-c0d77af7-ea59-41ce-8b82-6af48acbdef3.jpg",300,300,false],"1536x1536":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4125-c0d77af7-ea59-41ce-8b82-6af48acbdef3.jpg",300,300,false],"2048x2048":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4125-c0d77af7-ea59-41ce-8b82-6af48acbdef3.jpg",300,300,false],"morenews-featured":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4125-c0d77af7-ea59-41ce-8b82-6af48acbdef3.jpg",300,300,false],"morenews-large":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4125-c0d77af7-ea59-41ce-8b82-6af48acbdef3.jpg",300,300,false],"morenews-medium":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4125-c0d77af7-ea59-41ce-8b82-6af48acbdef3.jpg",300,300,false],"crawlomatic_preview_image":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4125-c0d77af7-ea59-41ce-8b82-6af48acbdef3-146x146.jpg",146,146,true]},"author_info":{"display_name":"henry","author_link":"https:\/\/ft365.org\/index.php\/author\/henry\/"},"category_info":"<a href=\"https:\/\/ft365.org\/index.php\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","tag_info":"Uncategorized","comment_count":"0","_links":{"self":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/4125","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/comments?post=4125"}],"version-history":[{"count":0,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/4125\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media\/4126"}],"wp:attachment":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media?parent=4125"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/categories?post=4125"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/tags?post=4125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}