Are you a manufacturer
Yes
No
Does your current cybersecurity strategy include protections for OT (Operational Technology) devices?
Yes, it includes both OT and IT systems
No, it only covers office and IT systems
We don’t have a cybersecurity strategy
How is access to OT systems managed in your organization?
No access control policy in place
We have an access control policy, but it’s not actively enforced
We have a fully enforced access control policy
What is your incident response plan?
We don’t have an incident response plan
We have an IT incident response plan but it’s not tested
We have an IT incident response plan and it’s tested regularly
We have an IT & OT incident response plan and it's tested regularly
How do you monitor your OT network?
We don’t monitor our network
We monitor our network but only for compliance purposes
We monitor our network for security purposes
How do you manage third-party risks?
We don’t manage third-party risks
We manage third-party risks but only for compliance purposes
We manage third-party risks for security purposes with continuous monitoring
How do you train your employees on cybersecurity?
We don’t train our employees on cybersecurity
We train our computer user employees on cybersecurity but only once a year
We ALL train our employees including OT operators on cybersecurity regularly throughout the year
Do you have cyber insurance?
Yes
No
I don't know
What best reflects your situation
I'm the Boss (e.g. Owner/CEO)
I'm a Senior Decision Maker (e.g. VP/C-Suite)
I'm just doing research (e.g. Low level grunt)
First Name
Last Name
Email
*