US-CERT’s most recent statistics show manufacturing as the most targeted sector, accounting for 22 percent of all cyberattacks. ICS attacks use multiple vectors: compromise IT and move into OT, compromise OT directly, insider threats and supply chain. A holistic security strategy for converged IT and OT is imperative. Use this Top 10 list from leading CISOs to benchmark your IT/OT security strategy.
Pre-Requisites: Basic understanding of operational technology as well as the high level concepts covered in the NIST CSF.
Interested? We have you covered! This popular session will also be streamed live in The Session Viewing Point, West Level 2 Room 2004.
Technology Infrastructure & Operations
operational technology (OT Security) infrastructure security critical infrastructure
Share With Your Community