Overview
Explore a comprehensive roadmap for implementing ICS/OT cybersecurity in this 59-minute webinar. Learn how to unite your enterprise around cybersecurity efforts by addressing the evolving threat landscape, accounting for your unique business environment, and establishing a common language to communicate risks across the organization. Discover strategies for identifying critical assets, protecting OT systems, and building a sustainable security program. Gain insights into the ICS Security Crucible, IT-centric controls, and survey results. Examine the concept of "Left and Right of Boom," scenario generation, and crown jewels identification. Understand maturity models, management domains, and the Cybersecurity Capability Model. Explore practical steps for creating a risk register, developing metrics, and determining what matters most in detection and response. Analyze real-world examples, discuss the NIST Cybersecurity Framework vs. C2M2, and learn how to quantify likelihood and develop effective KPIs for your ICS/OT cybersecurity initiatives.
Syllabus
Introduction
Initial Questions
ICSOT
ICS Security Crucible
Why talk about this
Why now
IT centric controls
Survey results
Roadmaps
Roadmap Example
Left and Right of Boom
Impacts
Scenario Generation
Crown Jewels
Maturity
Crawl Walk Run
Maturity Models
Management Domains
Cybersecurity Capability Model
Next Steps
Risk Register
Metrics
What Matters Most
Detect and Respond
Real World Example
QA Why Now
Impacts of Total Loss
NIST Cybersecurity Framework vs C2M2
How do you quantify a likelihood
Examples of good KPIs
Taught by
Dragos: ICS Cybersecurity