Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Do No Harm: OT-Native Approach for Network Monitoring and Cybersecurity

Dragos: ICS Cybersecurity via YouTube

Overview

Explore an OT-native approach to network monitoring and cybersecurity in this 43-minute session presented by Nick Shaw, Principal Advisory Solution Architect at Dragos: ICS Cybersecurity. Dive into seven key principles for effective OT cyber-network visibility and monitoring, tailored specifically for Industrial Control Systems (ICS) and Operational Technology (OT) environments. Learn how to implement a "Do No Harm" strategy that ensures 100% uptime while maintaining comprehensive asset inventories across all Purdue Model levels. Discover methods for gaining deep insights through detailed OT system traffic monitoring, and explore practical vulnerability management techniques when patching isn't feasible. Understand the importance of OT-focused threat detection that goes beyond anomalies by leveraging OT Cyber Threat Intelligence. Explore ways to drive operational value through insightful root cause analysis and seamlessly integrate OT monitoring into existing IT security operations. Gain valuable knowledge on protecting critical infrastructure while preserving operational integrity in the face of increasingly sophisticated threats to OT environments.

Syllabus

Do No Harm: OT-Native Approach for Network Monitoring and Cybersecurity

Taught by

Dragos: ICS Cybersecurity

Reviews

Start your review of Do No Harm: OT-Native Approach for Network Monitoring and Cybersecurity

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.