TP Research Industrial Secure Remote Access Survey
1. This is an anonymous survey. Your company or personal details will NOT be included in any public results. However, if you would like to participate in the drawing for an awesome library of cybersecurity books, we will need some information in order to enter you into the draw and send you your prize, as well as send you a copy of the final report.
*
1. This is an anonymous survey. Your company or personal details will NOT be included in any public results. However, if you would like to participate in the drawing for an awesome library of cybersecurity books, we will need some information in order to enter you into the draw and send you your prize, as well as send you a copy of the final report.
2. Which of the following best described the principal industry of your organization?
*
3. What is your primary region?
*
4. What size is the workforce at your organization, including employees, contractors, and consultants?
*
5. What is your current role in the organization?
*
6. On average, how many users connect to your OT/ICS environment per day?
*
7. What are the top 3 business reasons for connecting your OT/ICS environment?
*
7. What are the top 3 business reasons for connecting your OT/ICS environment?
8. How concerned are you about remote access threats to your OT/ICS systems?
*
9. How would you rate your organization's current methods and approach to securing any connection into you OT/ICS environment?
10. What do you consider the biggest risk from remote connections into your OT/ICS environment? (select all that apply)
*
10. What do you consider the biggest risk from remote connections into your OT/ICS environment? (select all that apply)
11. Which industrial Remote Access exposures are you most concerned about? (select all that apply)
*
11. Which industrial Remote Access exposures are you most concerned about? (select all that apply)
12. What tactics and solutions have you implemented to lower the risk of external users connecting to your OT/ICS environment? (select all that apply)
*
12. What tactics and solutions have you implemented to lower the risk of external users connecting to your OT/ICS environment? (select all that apply)
13. What are the primary objectives you are looking to achieve from securing the access to your OT/ICS environment? (Select all that apply)
*
13. What are the primary objectives you are looking to achieve from securing the access to your OT/ICS environment? (Select all that apply)
14. Which Industrial Cybersecurity standard(s) or framework(s) has your organization adopted? (select all that apply)
*
14. Which Industrial Cybersecurity standard(s) or framework(s) has your organization adopted? (select all that apply)