Leveraging Zero Trust to Protect IoT and OT Assets
Offered By: Cloud Security Alliance via YouTube
Course Description
Overview
Explore how Zero Trust principles can enhance cybersecurity for Internet of Things (IoT) and Operational Technology (OT) assets in this 23-minute talk by John Kindervag, the creator of Zero Trust. Learn about the Colonial Pipeline attack and Marai Botnet incident, which underscore the urgent need for improved security measures. Discover the implications of President Biden's Executive Order 14028 on cybersecurity and its emphasis on Zero Trust Architecture. Gain insights into applying the 5 Steps of Zero Trust to protect various IT and OT environments, and understand how this approach simplifies the adoption of ISA/IEC 62443 Standards for industrial automation and control systems (IACS).
Syllabus
Things Run Amok. Leveraging Zero Trust to protect IoT and OT assets.
Taught by
Cloud Security Alliance
Related Courses
Web Science: How the Web Is Changing the WorldUniversity of Southampton via FutureLearn Develop Java Embedded Applications Using a Raspberry Pi
Oracle via Independent Introducción a Raspberry Pi (Ver-2)
Galileo University via Independent Fog Networks and the Internet of Things
Princeton University via Coursera Digital Media and Marketing Principles
University of Illinois at Urbana-Champaign via Coursera