10 Ways Asset Visibility Builds an Effective OT Cybersecurity Foundation
Dragos: ICS Cybersecurity via YouTube
Overview
Syllabus
Intro
Understanding what "normal" looks like
Not just identifying, but verifying assets
Improving change management with config detection
Minimizing the impact of compliance reporting
Justifying security program investments
7 Effective vulnerability mitigation
Threat detection in an ocean of noise
Stopping rogue assets in their tracks
Incident response when the heat is on
Taught by
Dragos: ICS Cybersecurity