Главная
Study mode:
on
1
RSAConference2022 San Francisco Digital June 6 - 9
2
ICS/CERT Advisories 2010 - 2021
3
Industrial Control Systems Vulnerabilities - History
4
Industrial Control Systems Vulnerabilities 2022 CISA Releases Security Advisories for Rockwell Automation Products
5
Worms, Old and New
6
Weak Points in the Industrial Environment
7
Attacks against Automation Software
8
What is Zero Trust?
9
Many Paths to Zero Trust
10
Cyber Process Hazard Analysis
11
Typical Attack Process and Tools
12
How to Defend: CISA Recommendations
13
ICS 410: SANS ICS/SCADA Security Essentials
14
Top Mitigation Steps - Claroty 1H21 Analysis
15
Why is ICS Security So Hard?
16
Organizational Silos Create Attack Surfaces
17
Integrate MSPs
18
A Step-by-Step Guide to Securing the Industrial Environment
19
RSAConference 2022
Description:
Explore a comprehensive 44-minute conference talk from RSA Conference on implementing Zero Trust principles in Industrial Control Systems (ICS). Learn about Zero Trust concepts, ICS vulnerabilities, and strategies to integrate these approaches for enhanced cybersecurity readiness. Delve into the history of ICS vulnerabilities, recent security advisories, and common weak points in industrial environments. Examine various paths to Zero Trust implementation, cyber process hazard analysis, and typical attack processes. Discover CISA recommendations for defense, top mitigation steps, and reasons behind the complexity of ICS security. Gain insights on overcoming organizational silos, integrating Managed Service Providers, and follow a step-by-step guide to securing industrial environments. This talk, presented by Bill Malik, VP of Infrastructure Strategies at Trend Micro, offers valuable knowledge for IT security and OT safety professionals seeking a unified approach to threat response and overall cybersecurity improvement. Read more

Bringing Zero Trust to Industrial Control Systems

RSA Conference
Add to list
0:00 / 0:00