Posted on
in Presentations
With the heightened concern about cyberattacks on critical infrastructure, many have concluded that we have little visibility into industrial control systems to detect malicious or inappropriate activity. This session will draw on the experience of participants to understand what ICS detection technologies they’re exploring, what works, and what technologies and techniques need more improvement.
Learning Objectives:
1: Understand where in an OT environment to monitor to detect threats.
2: Explore a process to implement a holistic monitoring program for OT.
3: Learn the various monitoring techniques for proprietary OT devices.
Learning Objectives:
1: Understand where in an OT environment to monitor to detect threats.
2: Explore a process to implement a holistic monitoring program for OT.
3: Learn the various monitoring techniques for proprietary OT devices.
Analytics Intelligence & Response
SIEM security operations threat visualization operational technology (OT Security) critical infrastructure
Topic
Analytics Intelligence & Response
Subtopic
SIEM
security operations
threat visualization
operational technology (OT Security)
critical infrastructure
Share With Your Community