Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

OT Cybersecurity for IT Professionals - Understanding ICS Environments

Dragos: ICS Cybersecurity via YouTube

Overview

Explore the critical differences and convergence points between IT and OT cybersecurity in this informative webinar. Gain insights into the unique challenges faced by OT teams in securing industrial control systems (ICS) within critical infrastructure. Discover key attributes of OT environments, understand the OT Security Triangle, and learn how to conduct a Crown Jewel Analysis. Delve into practical strategies for implementing security controls, managing risks, and addressing threats specific to OT systems. Learn how to develop an effective incident response plan, establish proper architecture, and implement network monitoring for OT environments. Explore vulnerability management techniques and best practices for remote access in industrial settings. Understand the importance of collaboration between IT and OT teams and the continuous process of improving OT cybersecurity. Equip yourself with the knowledge to align people, processes, and technology towards building a sustainable approach to cybersecurity in critical infrastructure.

Syllabus

Introduction
OT vs IT
Challenges
Downsides
OT Security Triangle
What is OT
OT Attributes
OT Requirements
Security Controls
Risk
Threats
Crown Jewel Analysis
Crown Jewel Analysis Methodology
Refinery Example
How do we start
Instant Response Plan
Architecture
Network Monitoring
Vulnerability Management
Remote Access
Working Together
Continuous Process
OT Cybersecurity
QA

Taught by

Dragos: ICS Cybersecurity

Reviews

Start your review of OT Cybersecurity for IT Professionals - Understanding ICS Environments

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.