Secure Operations Technology – Most OT security programs seek to “protect the information” but thoroughly-secured industrial sites protect physical industrial operations from cyberattacks that may be embedded in the information. All cyberattacks are information, after all, and every bit of information can encode an attack.
Secure Operations Technology is a perspective, a methodology, and a set of best practices used by thoroughly-secured sites. Since all cyberattacks are information, a comprehensive inventory of information flows into a critical network is also a comprehensive inventory of all possible attack vectors targeting that network. SEC-OT sites can then take measures to physically block or otherwise discipline the entire inventory of inbound information/attack flows.
Presenter: Andrew Ginter of Waterfall Security Solutions
To register for this webinar, please send an email with your name, company, and sector from a work-related email address to ICSJWG.Communications@hq.dhs.gov