3 Keys to Securing Converged IT/OT Environments