OT Security: Bridging the Silos
Most OT systems are designed with very little consideration for security. With increased cyber risk in this new digital transformation era, any approach to bridge the IT and OT divide is mission critical for enterprise security. As a CISO, can you reduce risk, security and risk management function silos to bridge the security gaps? Can you deploy suitable asset inventory methods and map the IT/OT risks?
See Also: Live Webinar | From Risk to Resilience: Elevating Cyber Awareness and Human Risk Management
The session will cover:
- Building complete visibility to and monitoring of your IT and OT assets with the right access control
- Integrating OT threat monitoring into SOC for threat detection
- Essential steps to establish OT security