Главная
Study mode:
on
1
Introduction
2
Security in OT
3
OT Security
4
OT Security in 2020
5
Is this just theory
6
Process Technology
7
Management Support
8
Policies Procedures
9
Survey Results
10
Regulatory Standards
11
Security Domains
12
Safety
13
Hazop Flow Chart
14
IoT
15
IoT layers
16
Summary
17
Questions
18
How do we integrate technical assessment with compliance
19
Thank you
20
Question from Anthony
21
Question from Student
Description:
Explore the critical aspects of security compliance in Industrial Control Systems (ICS) environments in this 47-minute webinar presented by Krishna S Tadimeti, a Senior Cybersecurity consultant at EY. Delve into the evolving landscape of Operational Technology (OT) networks, examining how the blurring boundaries between OT and IT networks increase the risk of external attacks. Learn why vulnerability assessment alone is insufficient for protecting OT environments and discover the importance of implementing a comprehensive compliance structure. Gain insights into risk identification beyond Vulnerability Assessment and Penetration Testing (VA/PT), and understand how to build a well-rounded security program that incorporates both external and internal regulations. Benefit from Tadimeti's expertise in conducting security assessments for critical industrial environments such as Oil & Gas, Energy, Manufacturing, and Smart Cities, and explore his research-based, people-centric approach to digital transformation in businesses. Read more

Security Compliance in the ICS Environment

nullcon
Add to list