Главная
Study mode:
on
1
Introduction
2
Initial Questions
3
ICSOT
4
ICS Security Crucible
5
Why talk about this
6
Why now
7
IT centric controls
8
Survey results
9
Roadmaps
10
Roadmap Example
11
Left and Right of Boom
12
Impacts
13
Scenario Generation
14
Crown Jewels
15
Maturity
16
Crawl Walk Run
17
Maturity Models
18
Management Domains
19
Cybersecurity Capability Model
20
Next Steps
21
Risk Register
22
Metrics
23
What Matters Most
24
Detect and Respond
25
Real World Example
26
QA Why Now
27
Impacts of Total Loss
28
NIST Cybersecurity Framework vs C2M2
29
How do you quantify a likelihood
30
Examples of good KPIs
Description:
Explore a comprehensive roadmap for implementing ICS/OT cybersecurity in this 59-minute webinar. Learn how to unite your enterprise around cybersecurity efforts by addressing the evolving threat landscape, accounting for your unique business environment, and establishing a common language to communicate risks across the organization. Discover strategies for identifying critical assets, protecting OT systems, and building a sustainable security program. Gain insights into the ICS Security Crucible, IT-centric controls, and survey results. Examine the concept of "Left and Right of Boom," scenario generation, and crown jewels identification. Understand maturity models, management domains, and the Cybersecurity Capability Model. Explore practical steps for creating a risk register, developing metrics, and determining what matters most in detection and response. Analyze real-world examples, discuss the NIST Cybersecurity Framework vs. C2M2, and learn how to quantify likelihood and develop effective KPIs for your ICS/OT cybersecurity initiatives. Read more

Starting Your Journey: A Roadmap for ICS/OT Cybersecurity

Dragos: ICS Cybersecurity
Add to list
0:00 / 0:00