They are the workhorses of industrial operations and critical infrastructure. Industrial Controllers such as PLCs, RTUs an DCSs have been around forever and control virtually everything. Back when these controllers were deployed, there was little concern for security; but times have changed. As a result, you are now exposed to consistent and confusing noise regarding various ICS security approaches. You must take action, but what is the right action to take?
In this session we will help unravel the confusion and specifically:
- Explain the different approaches for ICS security
- Learn about the differences between active, passive and hybrid ICS security monitoring approaches
- Understand the benefits and disadvantages of each
- Learn which security gaps are addressed and not addressed by each approach
Expected Outcome: For IT and OT leaders to have the knowledge to determine which approach is best suited for protecting their ICS network. A handout will be provided which is an ICS Security Checklist, which serves as a starting point for any industrial cybersecurity program.
Intended Audience: CISO, Security Engineering, OT Security, SCADA, Network Architecture, Infrastructure