Zero trust isn’t just for IT, it can also protect targeted critical infrastructure
The first step is understanding what they have in their OT environments, how that’s connected to their IT networks and the Internet, and what risks exist due to those connections.