Alternative Model for OT Cybersecurity Threat Detection & Response
Securing OT environments is not an easy task. Unlike their counterparts in the IT world, OT systems are typically older and sensitive to change, making them difficult to monitor and instrument. Further, OT systems are rarely patched on a monthly cycle, increasing their vulnerability to potential cyber threats. In this session, I will be sharing an alternative model to threat detection and response specifically for OT environments. Learn how an accurate asset inventory, correlation of telemetry from ALL OT sources, and OT-tailored response playbooks can converge to reduce your overall risk to attacks that specifically target process control networks.