Beyond Risk Assessments—Practical Steps in Implementing Treatment for ICS

Posted on in Presentations

Congratulations! You successfully performed risk assessments of your ICS. Beyond the shiny report, what happens next? How do you implement the risk assessment recommendations? Where do you even begin? How do engage ICS operators? What are the differences between an IT and ICS environment. This session will discuss practical insights on how to approach risk treatment in an ICS environment.

Learning Objectives:
1: Identify the unique attributes of an ICS environment pertaining to risk treatment.
2: Explore practical insights on how to engage IT and OT teams for risk treatment.
3: Explore practical insights on how to address common challenges in risk treatment.

Ola Lawal

Founder and Principal Consultant, Cyberdefense Partners Inc.

governance risk & compliance operational technology (OT Security) risk management critical infrastructure


Share With Your Community