YoVDO

ICS Security Crucible: Forging Programmatic Armor and Weapons for Industrial Operations

Offered By: Dragos: ICS Cybersecurity via YouTube

Tags

Industrial Control Systems Security Courses Cybersecurity Courses Risk Management Courses Security Automation Courses Maturity Models Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore an innovative approach to industrial control system (ICS) security in this 29-minute conference talk. Discover the "ICS Security Crucible" concept, which integrates people, processes, and technology to craft tailored defenses for industrial operations. Learn how to address unique risks, impacts, budgets, and known threats through real-world use cases. Gain practical insights for developing or enhancing an ICS-specific security program, including the importance of using appropriate tools, understanding maturity models, and implementing effective governance, risk, and compliance (GRC) strategies. Delve into the challenges of ICS security and uncover solutions for building a robust defense framework tailored to your organization's specific needs.

Syllabus

Intro
Why is ICS security so difficult
Using the wrong tools
What is a crucible
mace
shield
bow
swords
build that out
roadmap
Maturity Model
The Crucible
GRC
Standards
Automation
The Right Tools
Define the Crucible


Taught by

Dragos: ICS Cybersecurity

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera