YoVDO

What's Behind the IT/OT Cultural Divide in Industrial Cybersecurity

Offered By: Dragos: ICS Cybersecurity via YouTube

Tags

Industrial Cybersecurity Courses Information Technology Courses Risk Management Courses Ransomware Courses Industrial Control Systems Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore key findings from the 2021 State of Industrial Cybersecurity Report in this 57-minute webinar featuring a panel of Chief Information Security Officers. Delve into the challenges of securing IT/OT environments, including the primary obstacle to IT and OT cohesion, industry-specific OT security approaches, investment priorities, and accountability for protecting industrial control systems. Gain insights into the causes, consequences, and costs of OT cybersecurity incidents. Learn from industry experts as they discuss the talent gap, the three pillars of OT security, and the evolution of cybersecurity practices. Understand the impact of ransomware, the importance of operational focus, and strategies for effectively communicating with the board about OT cyber status. Discover how organizations across 15 different industries are addressing industrial cybersecurity maturity and the surprising statistic that only 21% of organizations achieve full maturity in ICS/OT cybersecurity.

Syllabus

Introduction
Housekeeping
The Study
Demographics
Perceptions of OT
Key Findings
Guest Panelists
Survey Responses
The Talent Gap
The Three Pillars
Is it easier to take someone whos already in operations and add security to their mix
Do we need dedicated OT cyber practitioners
Focus not capability
Operational focus
Security
The wrench turners
The 10000 hour rule
Can you converse with the can
Textbook knowledge
Career path
Cyber School House
Cyber Incidents
Cyber Risk
Impact of Ransomware
Whats going on with Ransomware
Before and After
Understanding the Business
The Board
Evolution
Wrapup
Summary
Leadership
Closing


Taught by

Dragos: ICS Cybersecurity

Related Courses

Assessing the Security Posture of ICS Infrastructure Using ISA 62443 Standard
nullcon via YouTube
Stealing PLC Intellectual Property - A Red Teaming Story
Hack In The Box Security Conference via YouTube
Think Like a Hacker, but Act Like an Engineer
Kaspersky via YouTube
The Building Blocks of Good Detection and Response Services for the ICS Environment
Kaspersky via YouTube
Cybersecurity on Rails - A Look at the Connected Train
Kaspersky via YouTube