Posted on
in Presentations
US-CERT’s most recent statistics show manufacturing as the most targeted sector, accounting for 22 percent of all cyberattacks. ICS attacks use multiple vectors: compromise IT and move into OT, compromise OT directly, insider threats and supply chain. A holistic security strategy for converged IT and OT is imperative. Use this Top 10 list from leading CISOs to benchmark your IT/OT security strategy.
Pre-Requisites: Basic understanding of operational technology as well as the high level concepts covered in the NIST CSF.
Pre-Requisites: Basic understanding of operational technology as well as the high level concepts covered in the NIST CSF.
Share With Your Community