Skip to main content

Operational Technology

Operational Technology (OT) Security is fundamental to protecting client, colleague, organizational data and operational processing capabilities through design and industry recognized best practices.

Operational Technology (OT) Security is fundamental to protecting client, colleague, organizational data and operational processing capabilities through design and industry recognized best practices. It ensures that the operational technology environment comply with policies and standards, as well as maintaining compliance with the relevant regulations.

By applying a risk-based approach, OT Security achieves pragmatic security measures that comply with security policies, leveraging leading security technologies. This focus not only safeguards critical infrastructure but also continuously raises security awareness among colleagues, mitigating risks associated with cyber threats.

Marsh supports client with the assessment and bolstering of their OT/IACS Security capabilities –key services include:

  • Conducting OT/IACS Cyber Security current state, gap analysis and maturity assessments
  • Conducting OT/IACS Cyber Compliance Assessments national and international standards
  • OT/IACS cybersecurity transformations and implementation support
  • Implementation of OT/IACS cybersecurity programs, frameworks, development of OT/IACS governance, etc.