YoVDO

Do No Harm: OT-Native Approach for Network Monitoring and Cybersecurity

Offered By: Dragos: ICS Cybersecurity via YouTube

Tags

Cybersecurity Courses Industrial Control Systems Courses Threat Detection Courses Network Monitoring Courses Vulnerability Management Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore an OT-native approach to network monitoring and cybersecurity in this 43-minute session presented by Nick Shaw, Principal Advisory Solution Architect at Dragos: ICS Cybersecurity. Dive into seven key principles for effective OT cyber-network visibility and monitoring, tailored specifically for Industrial Control Systems (ICS) and Operational Technology (OT) environments. Learn how to implement a "Do No Harm" strategy that ensures 100% uptime while maintaining comprehensive asset inventories across all Purdue Model levels. Discover methods for gaining deep insights through detailed OT system traffic monitoring, and explore practical vulnerability management techniques when patching isn't feasible. Understand the importance of OT-focused threat detection that goes beyond anomalies by leveraging OT Cyber Threat Intelligence. Explore ways to drive operational value through insightful root cause analysis and seamlessly integrate OT monitoring into existing IT security operations. Gain valuable knowledge on protecting critical infrastructure while preserving operational integrity in the face of increasingly sophisticated threats to OT environments.

Syllabus

Do No Harm: OT-Native Approach for Network Monitoring and Cybersecurity


Taught by

Dragos: ICS Cybersecurity

Related Courses

Cyber-Physical Systems Security
Georgia Institute of Technology via Udacity
Specialized Attacks: OT and ICS
Pluralsight
CompTIA Network+ (N10-008) Cert Prep: 8 Network Integration and Operation
LinkedIn Learning
Fundamentals of OT Cybersecurity (ICS/SCADA)
Udemy
Why Groov EPIC
Opto Video via YouTube