YoVDO

10 Ways Asset Visibility Builds an Effective OT Cybersecurity Foundation

Offered By: Dragos: ICS Cybersecurity via YouTube

Tags

Industrial Control Systems Courses Change Management Courses Incident Response Courses Threat Detection Courses Vulnerability Management Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore 10 crucial ways asset visibility strengthens operational technology (OT) cybersecurity foundations in this 45-minute webinar by Dragos experts. Gain insights into establishing "normal" baselines, verifying assets, visualizing network communications, and enhancing threat detection. Learn strategies for managing rogue assets, improving incident response, mitigating vulnerabilities, and optimizing change management. Discover how to streamline compliance reporting and justify security investments. Benefit from real-world examples and practical tips to elevate your OT cybersecurity strategy through comprehensive asset visibility.

Syllabus

Intro
Understanding what "normal" looks like
Not just identifying, but verifying assets
Improving change management with config detection
Minimizing the impact of compliance reporting
Justifying security program investments
7 Effective vulnerability mitigation
Threat detection in an ocean of noise
Stopping rogue assets in their tracks
Incident response when the heat is on


Taught by

Dragos: ICS Cybersecurity

Related Courses

The Foundations of Cybersecurity
University System of Georgia via Coursera
Introduction to Cybersecurity
SecurityScoreCard via Udacity
TOTAL: CompTIA CySA+ Cybersecurity Analyst (CS0-003)
Udemy
Fundamentals of Internet Security | Secure Your Environment
Udemy
Ciberseguridad en linea
Udemy