OT Cybersecurity for IT Professionals - Understanding ICS Environments
Dragos: ICS Cybersecurity via YouTube
Overview
Syllabus
Introduction
OT vs IT
Challenges
Downsides
OT Security Triangle
What is OT
OT Attributes
OT Requirements
Security Controls
Risk
Threats
Crown Jewel Analysis
Crown Jewel Analysis Methodology
Refinery Example
How do we start
Instant Response Plan
Architecture
Network Monitoring
Vulnerability Management
Remote Access
Working Together
Continuous Process
OT Cybersecurity
QA
Taught by
Dragos: ICS Cybersecurity