OT Cybersecurity for IT Professionals - Understanding ICS Environments
Offered By: Dragos: ICS Cybersecurity via YouTube
Course Description
Overview
Explore the critical differences and convergence points between IT and OT cybersecurity in this informative webinar. Gain insights into the unique challenges faced by OT teams in securing industrial control systems (ICS) within critical infrastructure. Discover key attributes of OT environments, understand the OT Security Triangle, and learn how to conduct a Crown Jewel Analysis. Delve into practical strategies for implementing security controls, managing risks, and addressing threats specific to OT systems. Learn how to develop an effective incident response plan, establish proper architecture, and implement network monitoring for OT environments. Explore vulnerability management techniques and best practices for remote access in industrial settings. Understand the importance of collaboration between IT and OT teams and the continuous process of improving OT cybersecurity. Equip yourself with the knowledge to align people, processes, and technology towards building a sustainable approach to cybersecurity in critical infrastructure.
Syllabus
Introduction
OT vs IT
Challenges
Downsides
OT Security Triangle
What is OT
OT Attributes
OT Requirements
Security Controls
Risk
Threats
Crown Jewel Analysis
Crown Jewel Analysis Methodology
Refinery Example
How do we start
Instant Response Plan
Architecture
Network Monitoring
Vulnerability Management
Remote Access
Working Together
Continuous Process
OT Cybersecurity
QA
Taught by
Dragos: ICS Cybersecurity
Related Courses
Information Security Management in a NutshellSAP Learning Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Enterprise Security Fundamentals
Microsoft via edX Planning a Security Incident Response
Microsoft via edX Introduction to Cybersecurity
Udacity