<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Operation Technology (OT) Security &#8211; IT Kombinat</title>
	<atom:link href="https://itkombinat.com/category/perational-technology-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://itkombinat.com</link>
	<description>The slightly different consulting company</description>
	<lastBuildDate>Fri, 30 May 2025 05:50:28 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://itkombinat.com/wp-content/uploads/cropped-logo-32x32.png</url>
	<title>Operation Technology (OT) Security &#8211; IT Kombinat</title>
	<link>https://itkombinat.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>OT Security &#8211; Why you should act now</title>
		<link>https://itkombinat.com/ot-security-why-you-should-act-now/</link>
		
		<dc:creator><![CDATA[Thomas Benz]]></dc:creator>
		<pubDate>Tue, 04 Jun 2024 12:07:24 +0000</pubDate>
				<category><![CDATA[Operation Technology (OT) Security]]></category>
		<category><![CDATA[NIS 2.0]]></category>
		<category><![CDATA[OT Security]]></category>
		<guid isPermaLink="false">https://itkombinat.com/?p=1518</guid>

					<description><![CDATA[The TXOne Networks Portable Inspector enables operations personnel to perform regular digital cleaning and inventory management tasks on the fly, safeguarding the production environment! The benefits in a nutshell: 3-in-1 toolset for safety inspection, which can be used individually and together. Independent technical design that does not require installation. Safeguarding the supply chain by checking [&#8230;]]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1200" height="473" src="https://itkombinat.com/wp-content/uploads/Portable-Inspector-1200x473.png" alt="" class="wp-image-1519" srcset="https://itkombinat.com/wp-content/uploads//Portable-Inspector-1200x473.png 1200w, https://itkombinat.com/wp-content/uploads//Portable-Inspector-560x221.png 560w, https://itkombinat.com/wp-content/uploads//Portable-Inspector-768x303.png 768w, https://itkombinat.com/wp-content/uploads//Portable-Inspector-1536x606.png 1536w, https://itkombinat.com/wp-content/uploads//Portable-Inspector-1120x442.png 1120w, https://itkombinat.com/wp-content/uploads//Portable-Inspector.png 1570w" sizes="(max-width: 1200px) 100vw, 1200px" /></figure>



<p>The TXOne Networks Portable Inspector enables operations personnel to perform regular digital cleaning and inventory management tasks on the fly, safeguarding the production environment!<br><br><br></p>



<h2 class="wp-block-heading"><strong>The benefits in a nutshell:</strong></h2>



<h4 class="wp-block-heading"><br>3-in-1 toolset for safety inspection, which can be used individually and together.<br><br>Independent technical design that does not require installation.<br><br>Safeguarding the supply chain by checking incoming/outgoing devices, systems/machines and media (NIS2 relevant).<br><br>Secure data transmission between the devices with AES-256 encryption.<br><br>Simplifying compliance and audits.<br><br>Recording and summarizing the system vulnerabilities for each asset.</h4>



<p><br><br><br>Check information set below or <a href="https://itkombinat.com/contact/"><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-primary-color">contact us</mark> </a>for additional information!</p>



<div class="wp-block-file"><a id="wp-block-file--media-45e68980-ed64-4834-87ba-490b816c9ef1" href="https://itkombinat.com/wp-content/uploads/IT-Kombinat_Promosheet_ohne_timeline.pdf">IT Kombinat: Portable Inspector</a><a href="https://itkombinat.com/wp-content/uploads/IT-Kombinat_Promosheet_ohne_timeline.pdf" class="wp-block-file__button wp-element-button" download aria-describedby="wp-block-file--media-45e68980-ed64-4834-87ba-490b816c9ef1">Download</a></div>



<div class="wp-block-file"><a id="wp-block-file--media-cad6be59-b24e-41a6-a4a0-ff5263b9e602" href="https://itkombinat.com/wp-content/uploads/NIS-2-Broschure_IT-Kombinat.pdf">NIS-2-Broschure_IT-Kombinat</a><a href="https://itkombinat.com/wp-content/uploads/NIS-2-Broschure_IT-Kombinat.pdf" class="wp-block-file__button wp-element-button" download aria-describedby="wp-block-file--media-cad6be59-b24e-41a6-a4a0-ff5263b9e602">Download</a></div>



<figure class="wp-block-image size-large"><a href="https://itkombinat.com/information-security/"><img decoding="async" width="1200" height="800" src="https://itkombinat.com/wp-content/uploads/pexels-samarth-singhai-1010079-1200x800.jpg" alt="" class="wp-image-1646" srcset="https://itkombinat.com/wp-content/uploads//pexels-samarth-singhai-1010079-1200x800.jpg 1200w, https://itkombinat.com/wp-content/uploads//pexels-samarth-singhai-1010079-560x373.jpg 560w, https://itkombinat.com/wp-content/uploads//pexels-samarth-singhai-1010079-768x512.jpg 768w, https://itkombinat.com/wp-content/uploads//pexels-samarth-singhai-1010079-1536x1024.jpg 1536w, https://itkombinat.com/wp-content/uploads//pexels-samarth-singhai-1010079-2048x1365.jpg 2048w, https://itkombinat.com/wp-content/uploads//pexels-samarth-singhai-1010079-1120x747.jpg 1120w" sizes="(max-width: 1200px) 100vw, 1200px" /></a></figure>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Information Security Directive NIS2 and its impact on SMEs – a seminar for members of the BVMW Wirtschaftssenat</title>
		<link>https://itkombinat.com/information-security-directive-nis2-and-its-impact-on-smes-a-seminar-for-members-of-the-bvmw-wirtschaftssenat/</link>
		
		<dc:creator><![CDATA[Thomas Benz]]></dc:creator>
		<pubDate>Thu, 01 Feb 2024 12:28:03 +0000</pubDate>
				<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Operation Technology (OT) Security]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[ITLeadership]]></category>
		<category><![CDATA[ITSecurity]]></category>
		<category><![CDATA[NIS2]]></category>
		<category><![CDATA[OTSecurity]]></category>
		<guid isPermaLink="false">https://itkombinat.com/?p=1456</guid>

					<description><![CDATA[The offices of IT Kombinat were the location for an engaging seminar on the topic of the Network &#38; Information Security Directive2 (NIS2) yesterday. Many thanks to Mr Herbert Schulte, Director of the Wirtschaftssenat for organising the event in partnership with IT Kombinat! Expanding on the scope of NIS1, NIS2 aims to further strengthen critical [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>  </p>



<p></p>



<figure class="wp-block-image size-full"><img decoding="async" width="1148" height="846" src="https://itkombinat.com/wp-content/uploads/BVMW-NIS2-Main.png" alt="" class="wp-image-1457" srcset="https://itkombinat.com/wp-content/uploads//BVMW-NIS2-Main.png 1148w, https://itkombinat.com/wp-content/uploads//BVMW-NIS2-Main-560x413.png 560w, https://itkombinat.com/wp-content/uploads//BVMW-NIS2-Main-768x566.png 768w, https://itkombinat.com/wp-content/uploads//BVMW-NIS2-Main-1120x825.png 1120w" sizes="(max-width: 1148px) 100vw, 1148px" /></figure>



<p></p>



<p>The offices of IT Kombinat were the location for an engaging seminar on the topic of the Network &amp; Information Security Directive2 (<a href="https://nis2directive.eu/what-is-nis2/">NIS2</a>) yesterday. Many thanks to Mr Herbert Schulte, Director of the Wirtschaftssenat for organising the event in partnership with <a href="http://itkombinat.com">IT Kombinat</a>!<br><br>Expanding on the scope of NIS1, NIS2 aims to further strengthen critical infrastructure and essential services within the EU. This should be achieved by requiring companies providing these services to implement appropriate security measures and to rapidly reportany incidents to the appropriate authorities (in Germany the <a href="https://www.bsi.bund.de/DE/Home/home_node.html">BSI</a>).<br></p>



<figure class="wp-block-image size-full"><img decoding="async" width="703" height="425" src="https://itkombinat.com/wp-content/uploads/BVMW-NIS2-1.jpg" alt="" class="wp-image-1458" srcset="https://itkombinat.com/wp-content/uploads//BVMW-NIS2-1.jpg 703w, https://itkombinat.com/wp-content/uploads//BVMW-NIS2-1-560x339.jpg 560w" sizes="(max-width: 703px) 100vw, 703px" /></figure>



<p>Bernhard Borsch, our Information Security specialist and co-founder presented a high-level perspective of NIS2, its scope, and enforcement guidelines. He also outlined the benefits of a business-centric approach to information security and the utility of a general Information Security Management System (<a href="https://en.wikipedia.org/wiki/Information_security_management">ISMS</a>) which encompasses many of the NIS2 requirements<em>.</em></p>



<p>An active and informative Q&amp;A session followed, with the attendees sharing their experiences of navigating security regulations and discussing the difficulties of recruiting and retaining good information security professionals. SMEs rarely have the resources to launch large security initiatives as some larger companies do, and the challenge of monitoring systems, diagnosing issues, analysing logs, fixing issues and informing authorities can seem daunting. Through his years of IT and OT security experience, Bernhard Borsch  was able to provide pragmatic and right-sized guidance</p>



<p>One significant area of discussion was Operation Technology security (OT security), which is a focus of NIS2. OT has traditionally not been within the remit of Information Security teams as these systems (e.g. production lines) operated only within their own networks. With the growth of Industry4.0 and other applications for operative system data, OT systems are increasingly connected to other networks and are thus vulnerable to attack. </p>



<p></p>



<figure class="wp-block-image size-full"><img decoding="async" width="697" height="469" src="https://itkombinat.com/wp-content/uploads/BVMW-NIS2-2.jpg" alt="" class="wp-image-1459" srcset="https://itkombinat.com/wp-content/uploads//BVMW-NIS2-2.jpg 697w, https://itkombinat.com/wp-content/uploads//BVMW-NIS2-2-560x377.jpg 560w" sizes="(max-width: 697px) 100vw, 697px" /></figure>



<p>We hope all attendees left the event well refreshed and well informed<em>. </em>We look forward to the next even with our Partner <a href="https://www.bvmw.de/">BVMW</a> and thank all involved for their time and attention.<br><br><br>Check the teaser slide set below or <a href="https://itkombinat.com/contact/">contact us</a> for additional information!</p>



<div class="wp-block-file"><a id="wp-block-file--media-27ba330c-e9f4-45c3-9a1b-2919ae6e7d40" href="https://itkombinat.com/wp-content/uploads/2024-01-31-BVMW-NIS2-Teaser-1.pdf">2024-01-31-BVMW-NIS2-Teaser-1</a><a href="https://itkombinat.com/wp-content/uploads/2024-01-31-BVMW-NIS2-Teaser-1.pdf" class="wp-block-file__button wp-element-button" download aria-describedby="wp-block-file--media-27ba330c-e9f4-45c3-9a1b-2919ae6e7d40">Download</a></div>



<p></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
