YoVDO

Preparing for Effective OT Incident Response - Key Actions and Recommendations

Offered By: Dragos: ICS Cybersecurity via YouTube

Tags

Incident Response Courses Cybersecurity Courses Emergency Preparedness Courses Industrial Control Systems Courses Incident Management Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical aspects of preparing for effective Operational Technology (OT) incident response in this informative webinar. Gain valuable insights from expert panelists as they discuss the intersection of OT incident response recommendations with incident management system principles. Learn about essential facilities, equipment, and personnel recommendations, as well as crucial procedures and communication tools. Discover an Incident Response Preparedness Key Actions Checklist to enhance your organization's readiness. Delve into the OT incident response process, phases of PICER, and the LOT IR eradication process. Understand how to create a CMF with practical examples. Examine the physical logistics of operationalizing teams, define roles and responsibilities, and establish documented, repeatable procedures. Review an example incident timeline and walk away with key takeaways to improve your OT incident preparedness strategy.

Syllabus

Intro
INTRODUCTION
INCIDENT REPONSE PROCESS IN OT
PHASES OF PICERL
OT IR ERADICATION PROCESS
CREATING A CMF (EXAMPLE)
FACILITIES PHYSICAL LOGISTICS OF OPERATIONALIZING THE TEAMS
PERSONNEL DEFINING ROLES & RESPONSIBILITIES
PROCEDURES DEFINED, DOCUMENTED, AND REPEATABLE
EXAMPLE INCIDENT TIMELINE
SUMMARY KEY TAKEAWAYS


Taught by

Dragos: ICS Cybersecurity

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network