Posted on
in Presentations
US-CERT’s most recent statistics show manufacturing as the most targeted sector, accounting for 22 percent of all cyberattacks. ICS attacks use multiple vectors: compromise IT and move into OT, compromise OT directly, insider threats and supply chain. A holistic security strategy for converged IT and OT is imperative. Use this Top 10 list from leading CISOs to benchmark your IT/OT security strategy.
Pre-Requisites: Basic understanding of operational technology as well as the high level concepts covered in the NIST CSF.
Pre-Requisites: Basic understanding of operational technology as well as the high level concepts covered in the NIST CSF.
Join the RSAC™ Membership to unlock AI-powered summaries, mind maps, and slides for this and other RSAC™ Conference presentations. Learn more.
Share With Your Community