With the heightened concern about cyberattacks on critical infrastructure, many have concluded that we have little visibility into industrial control systems to detect malicious or inappropriate activity. This session will draw on the experience of participants to understand what ICS detection technologies they’re exploring, what works, and what technologies and techniques need more improvement.
1: Understand where in an OT environment to monitor to detect threats.
2: Explore a process to implement a holistic monitoring program for OT.
3: Learn the various monitoring techniques for proprietary OT devices.