Top 10 List for Securing Your IT/OT Environment (Session Viewing Point)


Posted on in Presentations

US-CERT’s most recent statistics show manufacturing as the most targeted sector, accounting for 22 percent of all cyberattacks. ICS attacks use multiple vectors: compromise IT and move into OT, compromise OT directly, insider threats and supply chain. A holistic security strategy for converged IT and OT is imperative. Use this Top 10 list from leading CISOs to benchmark your IT/OT security strategy.

Pre-Requisites: Basic understanding of operational technology as well as the high level concepts covered in the NIST CSF.
Participants
Dawn Cappelli

Participant

Director, OT-CERT, Dragos

Roy Gundy

Participant

Head of OT Cyber Security, Johnson & Johnson


Share With Your Community