DiscoverInteractive ControlIndustrial Cybersecurity Part 3: Tools for Implementing your Cybersecurity Plan
Industrial Cybersecurity Part 3: Tools for Implementing your Cybersecurity Plan

Industrial Cybersecurity Part 3: Tools for Implementing your Cybersecurity Plan

Update: 2022-05-13
Share

Description

In part 1 of this series, we discussed emerging threats and attack vectors facing the industrial automation space. In part 2 we covered Operational Technology (or OT) and how to move from a reactive approach to cybersecurity to a proactive approach. In Part 3 we’ll cover specific tools that can be used to address challenges and implement a cybersecurity plan with my guest, Mohammed Al Afoo. Techniques discussed include non-repudiation, anomaly detection, perimeter protection, allow-listing, and more. 

Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Industrial Cybersecurity Part 3: Tools for Implementing your Cybersecurity Plan

Industrial Cybersecurity Part 3: Tools for Implementing your Cybersecurity Plan

Sebastien Bertrand