YoVDO

10 Ways Asset Visibility Builds an Effective OT Cybersecurity Foundation

Offered By: Dragos: ICS Cybersecurity via YouTube

Tags

Industrial Control Systems Courses Change Management Courses Incident Response Courses Threat Detection Courses Vulnerability Management Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore 10 crucial ways asset visibility strengthens operational technology (OT) cybersecurity foundations in this 45-minute webinar by Dragos experts. Gain insights into establishing "normal" baselines, verifying assets, visualizing network communications, and enhancing threat detection. Learn strategies for managing rogue assets, improving incident response, mitigating vulnerabilities, and optimizing change management. Discover how to streamline compliance reporting and justify security investments. Benefit from real-world examples and practical tips to elevate your OT cybersecurity strategy through comprehensive asset visibility.

Syllabus

Intro
Understanding what "normal" looks like
Not just identifying, but verifying assets
Improving change management with config detection
Minimizing the impact of compliance reporting
Justifying security program investments
7 Effective vulnerability mitigation
Threat detection in an ocean of noise
Stopping rogue assets in their tracks
Incident response when the heat is on


Taught by

Dragos: ICS Cybersecurity

Related Courses

Information Security Management in a Nutshell
SAP Learning
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera
Enterprise Security Fundamentals
Microsoft via edX
Planning a Security Incident Response
Microsoft via edX
Introduction to Cybersecurity
Udacity