10 Ways Asset Visibility Builds an Effective OT Cybersecurity Foundation
Offered By: Dragos: ICS Cybersecurity via YouTube
Course Description
Overview
Explore 10 crucial ways asset visibility strengthens operational technology (OT) cybersecurity foundations in this 45-minute webinar by Dragos experts. Gain insights into establishing "normal" baselines, verifying assets, visualizing network communications, and enhancing threat detection. Learn strategies for managing rogue assets, improving incident response, mitigating vulnerabilities, and optimizing change management. Discover how to streamline compliance reporting and justify security investments. Benefit from real-world examples and practical tips to elevate your OT cybersecurity strategy through comprehensive asset visibility.
Syllabus
Intro
Understanding what "normal" looks like
Not just identifying, but verifying assets
Improving change management with config detection
Minimizing the impact of compliance reporting
Justifying security program investments
7 Effective vulnerability mitigation
Threat detection in an ocean of noise
Stopping rogue assets in their tracks
Incident response when the heat is on
Taught by
Dragos: ICS Cybersecurity
Related Courses
Windows Server 2016 Security FeaturesMicrosoft via edX Detecting and Mitigating Cyber Threats and Attacks
University of Colorado System via Coursera Threat Detection: Planning for a Secure Enterprise
Microsoft via edX Microsoft Professional Capstone : Cybersecurity
Microsoft via edX Cyber Security Operations (Cisco CCNA)
The Open University via FutureLearn