NIST Recommendations For IoT & ICS Security

NIST’s latest report demonstrates how purpose-built IoT & ICS anomaly detection technologies can effectively reduce the risk of destructive cyberattacks.

Download the report

The latest NIST report describes how IoT & ICS anomaly detection technologies like CyberX enable manufacturing organizations to effectively reduce the risk of destructive cyberattacks — such as WannaCry, NotPetya, and TRITON — without impacting OT networks. 

The report, resulting from close collaboration between NIST’s National Cybersecurity Center of Excellence (NCCoE), CyberX and other technology providers such as OSIsoft, presents detailed findings and a reference architecture that organizations can use for their own environments. This comprehensive executive summary reveals: 

  • Why behavioral anomaly detection (BAD) is needed for detection of fileless and zero-day malware – and why traditional tools relying on predefined signatures are not effective 
  • Mapping the NIST Cybersecurity Framework (CSF) to BAD
  • 15 OT-specific threat scenarios devised by NIST and how CyberX’s agentless platform detected them in NIST’s OT testbed environment (with screenshots)

Get all the findings and expert recommendations.