Главная
Study mode:
on
1
Introduction
2
OT vs IT
3
Challenges
4
Downsides
5
OT Security Triangle
6
What is OT
7
OT Attributes
8
OT Requirements
9
Security Controls
10
Risk
11
Threats
12
Crown Jewel Analysis
13
Crown Jewel Analysis Methodology
14
Refinery Example
15
How do we start
16
Instant Response Plan
17
Architecture
18
Network Monitoring
19
Vulnerability Management
20
Remote Access
21
Working Together
22
Continuous Process
23
OT Cybersecurity
24
QA
Description:
Explore the critical differences and convergence points between IT and OT cybersecurity in this informative webinar. Gain insights into the unique challenges faced by OT teams in securing industrial control systems (ICS) within critical infrastructure. Discover key attributes of OT environments, understand the OT Security Triangle, and learn how to conduct a Crown Jewel Analysis. Delve into practical strategies for implementing security controls, managing risks, and addressing threats specific to OT systems. Learn how to develop an effective incident response plan, establish proper architecture, and implement network monitoring for OT environments. Explore vulnerability management techniques and best practices for remote access in industrial settings. Understand the importance of collaboration between IT and OT teams and the continuous process of improving OT cybersecurity. Equip yourself with the knowledge to align people, processes, and technology towards building a sustainable approach to cybersecurity in critical infrastructure. Read more

OT Cybersecurity for IT Professionals - Understanding ICS Environments

Dragos: ICS Cybersecurity
Add to list
0:00 / 0:00