Top 10 List for Securing Your IT/OT Environment


Posted on in Presentations

US-CERT’s most recent statistics show manufacturing as the most targeted sector, accounting for 22 percent of all cyberattacks. ICS attacks use multiple vectors: compromise IT and move into OT, compromise OT directly, insider threats and supply chain. A holistic security strategy for converged IT and OT is imperative. Use this Top 10 list from leading CISOs to benchmark your IT/OT security strategy.

Pre-Requisites: Basic understanding of operational technology as well as the high level concepts covered in the NIST CSF.

Access This and Other RSAC Conference Presentations with Your Free RSAC Membership

Your RSAC Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.

Watch Now >>
Participants
Dawn Cappelli

Participant

Director, OT-CERT, Dragos

Roy Gundy

Participant

Head of OT Cyber Security, Johnson & Johnson


Share With Your Community