{"id":8863,"date":"2021-06-28T19:35:27","date_gmt":"2021-06-28T19:35:27","guid":{"rendered":"https:\/\/www.bbrown.com\/insight\/operational-technology-the-new-it-risk-2\/"},"modified":"2021-06-28T19:35:27","modified_gmt":"2021-06-28T19:35:27","slug":"operational-technology-the-new-it-risk-2","status":"publish","type":"insight","link":"https:\/\/bbrown.com\/ca\/insight\/operational-technology-the-new-it-risk-2\/","title":{"rendered":"Operational Technology: The New IT Risk"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row row_style=&#8221;page-hero&#8221; full_width=&#8221;stretch_row_content&#8221;][vc_column]\n\t<div class=\"hero hero--wrap    \">\n\n\t\t<div class=\"hero--background-image hero--background-image-blur\">\n\t\t\t<div class=\"hero--overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"hero-background\" style=\"background: url(https:\/\/bbrown.com\/wp-content\/uploads\/2021\/12\/WhitePaper_CyberOT_WebsiteGraphic.jpg) center center no-repeat; background-size: cover;\"><\/div>\n\t\t\t\t\t<\/div>\n\n\t\t<div class=\"hero--container\">\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class=\"hero--inner width-100\">\n\n\t\t\t\t\t\n  <div class='content-heading  100%  '>\n    <p class='text-white subheading'>White Paper<\/p>\n    <h1 class='text-white    '>\n      Operational Technology: The New IT Risk\n    <\/h1>\n\t\n  <\/div>\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t<\/div>\n\n\t\n[\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243;]\n  <div class='content-heading  100% content-heading--ruled '>\n    \n    <h1 class='text-brand-dark-blue    h2'>\n      Operational Technology: The New IT Risk\n    <\/h1>\n\t\n  <\/div>[vc_column_text]<strong>Colonial Pipeline is just one recent example. The rise of ransomware has organizations rapidly committing resources to protect IT networks in the event of a cyberattack.<\/strong><\/p>\n<p>While much of the focus has been on the interruption of computer systems, which affects all industries, there has been an increasing number of attacks targeting manufacturers and their underlying Operational Technology (OT) systems. The attack on Colonial Pipeline resulting in the pipeline being taken offline is just one recent example. While the Colonial ransomware incident did not directly affect its OT systems, they were forced to be taken offline out of an abundance of caution, disrupting gas supply all along the East coast. A cyber insurance policy with certain key amendments may be effective at responding to these types of attacks.<\/p>\n<p><a href=\"https:\/\/www.sentinelone.com\/supply-chain\/?utm_source=beecher&amp;utm_medium=referral&amp;utm_campaign=supplychain#insurance-angle\" target=\"_blank\" rel=\"noopener\">Watch: Cyber Insurance and Risk Transfer &#8211; A Market in Transition<\/a><\/p>\n<h3>Download our white paper to learn more about OT attacks and insurance coverage options.<\/h3>\n<p>[\/vc_column_text]\t<div class='wpb_content_element text-left btn-container'>\n\t\t\t\t\t<a class='btn btn-brand-green  '\n\t\t\t\thref='https:\/\/bbrown.com\/wp-content\/uploads\/2021\/12\/White-Paper-%E2%80%93-Cyber-Operational-Technology-%E2%80%93-Brown-Brown.pdf' target='_blank' data-toggle=''>\n\t\t\t\t<span class=\"btn-text-color--default\">Download White Paper<\/span>\n\t\t\t<\/a>\n\t\t\t<\/div>\n[\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;1368&#8243; alignment=&#8221;center&#8221; style=&#8221;vc_box_circle_2&#8243;][vc_separator border_width=&#8221;2&#8243; el_width=&#8221;60&#8243;][vc_column_text]<\/p>\n<h6 style=\"text-align: center;\">by Chris Keegan<\/h6>\n<p style=\"text-align: center;\">Sr. Managing Director, Cyber &amp; Technology<\/p>\n<p>[\/vc_column_text][vc_single_image image=&#8221;1367&#8243; alignment=&#8221;center&#8221; style=&#8221;vc_box_circle_2&#8243;][vc_separator][vc_column_text]<\/p>\n<h6 style=\"text-align: center;\">by Oren Wortman<\/h6>\n<p style=\"text-align: center;\">Managing Director, Cyber &amp; Technology<\/p>\n<p>[\/vc_column_text]\t<div class='wpb_content_element text-center btn-container'>\n\t\t\t\t\t<a class='btn btn-brand-dark-blue  '\n\t\t\t\thref='\/us\/contact\/contact-general\/' target='' data-toggle=''>\n\t\t\t\t<span class=\"btn-text-color--default\">Connect Now<\/span>\n\t\t\t<\/a>\n\t\t\t<\/div>\n[\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row row_style=&#8221;page-hero&#8221; full_width=&#8221;stretch_row_content&#8221;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text]Colonial Pipeline is just one recent example. The rise of ransomware has organizations rapidly committing resources to protect IT networks in the event of a cyberattack. While [&hellip;]<\/p>\n","protected":false},"author":22,"featured_media":8864,"template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"insight_category":[34],"class_list":["post-8863","insight","type-insight","status-publish","has-post-thumbnail","hentry","insight_category-property-casualty"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Operational Technology: The New IT Risk - Brown &amp; Brown<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bbrown.com\/ca\/insight\/operational-technology-the-new-it-risk-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Operational Technology: The New IT Risk\" \/>\n<meta property=\"og:description\" content=\"[vc_row row_style=&#8221;page-hero&#8221; full_width=&#8221;stretch_row_content&#8221;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text]Colonial Pipeline is just one recent example. The rise of ransomware has organizations rapidly committing resources to protect IT networks in the event of a cyberattack. While [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bbrown.com\/ca\/insight\/operational-technology-the-new-it-risk-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Brown &amp; Brown\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bbrown.com\/wp-content\/uploads\/2021\/12\/WhitePaper_CyberOT_WebsiteGraphic.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1425\" \/>\n\t<meta property=\"og:image:height\" content=\"836\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bbrown.com\\\/ca\\\/insight\\\/operational-technology-the-new-it-risk-2\\\/\",\"url\":\"https:\\\/\\\/bbrown.com\\\/ca\\\/insight\\\/operational-technology-the-new-it-risk-2\\\/\",\"name\":\"Operational Technology: The New IT Risk - Brown &amp; Brown\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bbrown.com\\\/ca\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bbrown.com\\\/ca\\\/insight\\\/operational-technology-the-new-it-risk-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bbrown.com\\\/ca\\\/insight\\\/operational-technology-the-new-it-risk-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bbrown.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/WhitePaper_CyberOT_WebsiteGraphic.jpg\",\"datePublished\":\"2021-06-28T19:35:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bbrown.com\\\/ca\\\/insight\\\/operational-technology-the-new-it-risk-2\\\/#breadcrumb\"},\"inLanguage\":\"en-ca\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bbrown.com\\\/ca\\\/insight\\\/operational-technology-the-new-it-risk-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ca\",\"@id\":\"https:\\\/\\\/bbrown.com\\\/ca\\\/insight\\\/operational-technology-the-new-it-risk-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/bbrown.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/WhitePaper_CyberOT_WebsiteGraphic.jpg\",\"contentUrl\":\"https:\\\/\\\/bbrown.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/WhitePaper_CyberOT_WebsiteGraphic.jpg\",\"width\":1425,\"height\":836},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bbrown.com\\\/ca\\\/insight\\\/operational-technology-the-new-it-risk-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/bbrown.com\\\/ca\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Insights\",\"item\":\"https:\\\/\\\/bbrown.com\\\/ca\\\/news-events\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Operational Technology: The New IT Risk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bbrown.com\\\/ca\\\/#website\",\"url\":\"https:\\\/\\\/bbrown.com\\\/ca\\\/\",\"name\":\"Brown &amp; Brown\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/bbrown.com\\\/ca\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bbrown.com\\\/ca\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-ca\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/bbrown.com\\\/ca\\\/#organization\",\"name\":\"Brown &amp; Brown\",\"url\":\"https:\\\/\\\/bbrown.com\\\/ca\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ca\",\"@id\":\"https:\\\/\\\/bbrown.com\\\/ca\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/bbrown.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/cropped-BBRetail002-RGBrevs.png\",\"contentUrl\":\"https:\\\/\\\/bbrown.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/cropped-BBRetail002-RGBrevs.png\",\"width\":1000,\"height\":136,\"caption\":\"Brown &amp; Brown\"},\"image\":{\"@id\":\"https:\\\/\\\/bbrown.com\\\/ca\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Operational Technology: The New IT Risk - Brown &amp; Brown","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bbrown.com\/ca\/insight\/operational-technology-the-new-it-risk-2\/","og_locale":"en_US","og_type":"article","og_title":"Operational Technology: The New IT Risk","og_description":"[vc_row row_style=&#8221;page-hero&#8221; full_width=&#8221;stretch_row_content&#8221;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text]Colonial Pipeline is just one recent example. The rise of ransomware has organizations rapidly committing resources to protect IT networks in the event of a cyberattack. While [&hellip;]","og_url":"https:\/\/bbrown.com\/ca\/insight\/operational-technology-the-new-it-risk-2\/","og_site_name":"Brown &amp; Brown","og_image":[{"width":1425,"height":836,"url":"https:\/\/bbrown.com\/wp-content\/uploads\/2021\/12\/WhitePaper_CyberOT_WebsiteGraphic.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/bbrown.com\/ca\/insight\/operational-technology-the-new-it-risk-2\/","url":"https:\/\/bbrown.com\/ca\/insight\/operational-technology-the-new-it-risk-2\/","name":"Operational Technology: The New IT Risk - Brown &amp; Brown","isPartOf":{"@id":"https:\/\/bbrown.com\/ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bbrown.com\/ca\/insight\/operational-technology-the-new-it-risk-2\/#primaryimage"},"image":{"@id":"https:\/\/bbrown.com\/ca\/insight\/operational-technology-the-new-it-risk-2\/#primaryimage"},"thumbnailUrl":"https:\/\/bbrown.com\/wp-content\/uploads\/2021\/12\/WhitePaper_CyberOT_WebsiteGraphic.jpg","datePublished":"2021-06-28T19:35:27+00:00","breadcrumb":{"@id":"https:\/\/bbrown.com\/ca\/insight\/operational-technology-the-new-it-risk-2\/#breadcrumb"},"inLanguage":"en-ca","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bbrown.com\/ca\/insight\/operational-technology-the-new-it-risk-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-ca","@id":"https:\/\/bbrown.com\/ca\/insight\/operational-technology-the-new-it-risk-2\/#primaryimage","url":"https:\/\/bbrown.com\/wp-content\/uploads\/2021\/12\/WhitePaper_CyberOT_WebsiteGraphic.jpg","contentUrl":"https:\/\/bbrown.com\/wp-content\/uploads\/2021\/12\/WhitePaper_CyberOT_WebsiteGraphic.jpg","width":1425,"height":836},{"@type":"BreadcrumbList","@id":"https:\/\/bbrown.com\/ca\/insight\/operational-technology-the-new-it-risk-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/bbrown.com\/ca\/"},{"@type":"ListItem","position":2,"name":"Insights","item":"https:\/\/bbrown.com\/ca\/news-events\/"},{"@type":"ListItem","position":3,"name":"Operational Technology: The New IT Risk"}]},{"@type":"WebSite","@id":"https:\/\/bbrown.com\/ca\/#website","url":"https:\/\/bbrown.com\/ca\/","name":"Brown &amp; Brown","description":"","publisher":{"@id":"https:\/\/bbrown.com\/ca\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bbrown.com\/ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-ca"},{"@type":"Organization","@id":"https:\/\/bbrown.com\/ca\/#organization","name":"Brown &amp; Brown","url":"https:\/\/bbrown.com\/ca\/","logo":{"@type":"ImageObject","inLanguage":"en-ca","@id":"https:\/\/bbrown.com\/ca\/#\/schema\/logo\/image\/","url":"https:\/\/bbrown.com\/wp-content\/uploads\/2021\/12\/cropped-BBRetail002-RGBrevs.png","contentUrl":"https:\/\/bbrown.com\/wp-content\/uploads\/2021\/12\/cropped-BBRetail002-RGBrevs.png","width":1000,"height":136,"caption":"Brown &amp; Brown"},"image":{"@id":"https:\/\/bbrown.com\/ca\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/bbrown.com\/ca\/wp-json\/wp\/v2\/insight\/8863","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bbrown.com\/ca\/wp-json\/wp\/v2\/insight"}],"about":[{"href":"https:\/\/bbrown.com\/ca\/wp-json\/wp\/v2\/types\/insight"}],"author":[{"embeddable":true,"href":"https:\/\/bbrown.com\/ca\/wp-json\/wp\/v2\/users\/22"}],"version-history":[{"count":0,"href":"https:\/\/bbrown.com\/ca\/wp-json\/wp\/v2\/insight\/8863\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bbrown.com\/ca\/wp-json\/wp\/v2\/media\/8864"}],"wp:attachment":[{"href":"https:\/\/bbrown.com\/ca\/wp-json\/wp\/v2\/media?parent=8863"}],"wp:term":[{"taxonomy":"insight_category","embeddable":true,"href":"https:\/\/bbrown.com\/ca\/wp-json\/wp\/v2\/insight_category?post=8863"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}