YoVDO

OT Cybersecurity for IT Professionals - Understanding ICS Environments

Offered By: Dragos: ICS Cybersecurity via YouTube

Tags

Cybersecurity Courses Incident Response Courses Industrial Control Systems Courses Network Monitoring Courses Vulnerability Management Courses IT/OT Convergence Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical differences and convergence points between IT and OT cybersecurity in this informative webinar. Gain insights into the unique challenges faced by OT teams in securing industrial control systems (ICS) within critical infrastructure. Discover key attributes of OT environments, understand the OT Security Triangle, and learn how to conduct a Crown Jewel Analysis. Delve into practical strategies for implementing security controls, managing risks, and addressing threats specific to OT systems. Learn how to develop an effective incident response plan, establish proper architecture, and implement network monitoring for OT environments. Explore vulnerability management techniques and best practices for remote access in industrial settings. Understand the importance of collaboration between IT and OT teams and the continuous process of improving OT cybersecurity. Equip yourself with the knowledge to align people, processes, and technology towards building a sustainable approach to cybersecurity in critical infrastructure.

Syllabus

Introduction
OT vs IT
Challenges
Downsides
OT Security Triangle
What is OT
OT Attributes
OT Requirements
Security Controls
Risk
Threats
Crown Jewel Analysis
Crown Jewel Analysis Methodology
Refinery Example
How do we start
Instant Response Plan
Architecture
Network Monitoring
Vulnerability Management
Remote Access
Working Together
Continuous Process
OT Cybersecurity
QA


Taught by

Dragos: ICS Cybersecurity

Related Courses

Information Security Management in a Nutshell
SAP Learning
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera
Enterprise Security Fundamentals
Microsoft via edX
Planning a Security Incident Response
Microsoft via edX
Introduction to Cybersecurity
Udacity