Introduction

Connected workers are appearing in every industry and industrial activity. Off-site employees and vendors with remote access to OT systems are reducing facility downtimes and travel costs. Instant access to external resources and subject matter experts (SMEs) is improving the productivity of workers within plants. Connectivity is also enabling broader use of productivity-enhancing technologies, like cloud analytics and augmented reality.

Enabling connectivity within OT systems generates significant benefits, but it also increases the risks of  serious cyber incidents. Every time an external device gains access to an OT system the risks of malware injection and data loss increase. Every time a worker uses and OT device to access the internet a new pathway is opened for external attacks. 
 
The purpose of this survey is to understand what companies are doing to address the cyber risks of connected worker activities.  You will receive a report of the findings so you can understand how your connected worker OT cybersecurity strategy compares with peers, identify weaknesses, and justify investments to close critical gaps.  Survey results will also be shared with industrial cybersecurity attendees at the ARC Forum in Orlando Florida
 
Privacy: Your privacy is assured, and your identity will not be released to others. Your responses and the responses of your peers will only appear as aggregated information in the report you will receive for taking this survey.  If you have questions about the survey, please contact Sid Snitkin at srsnitkin@arcweb.com.

Question Title

* 1. Please indicate the kinds of connections your company allows into OT systems.

Question Title

* 2. Please indicate the kinds of external access on-site personnel have through OT system devices.

Question Title

* 3. Please indicate the things you are doing to protect your OT systems from untrustworthy "on-site" users. (Off-site users are addressed in the question on Secure Remote Access)

Question Title

* 4. Please indicate the things you are doing to address the risks of unauthorized devices gaining access to OT networks.

Question Title

* 5. Please indicate the things you are doing to control the risks of  compromised personal and vendor devices.

Question Title

* 6. Please indicate what you are doing to reduce the risks of confidential information loss through connected worker activities.

Question Title

* 7. Please indicate what you are doing to manage the security risks of remote access into OT systems.

Question Title

* 8. Please indicate what you are doing to protect systems against attacks when "on-site" personnel use OT connected devices to interact with external resources (sites and people).

Question Title

* 9. What roles do IT and OT security teams play in securing OT connected worker activities?

Question Title

* 11. What is your Region?

Question Title

* 12. Is your company a Supplier of Technology or Services, or an End User of Technology or Services?

Question Title

* 13. Please provide the following

Thank you for contributing to this survey.

Question Title

* 14. Please provide your email, so we can send you the survey report

Question Title

* 15. May we contact you to discuss your responses (and share findings)?

Question Title

* 16. Would you be interested in receiving information about ARC's cybersecurity services?

T