Industrial Cybersecurity Part 3: Tools for Implementing your Cybersecurity Plan
Manage episode 328381351 series 3272637
In part 1 of this series, we discussed emerging threats and attack vectors facing the industrial automation space. In part 2 we covered Operational Technology (or OT) and how to move from a reactive approach to cybersecurity to a proactive approach. In Part 3 we’ll cover specific tools that can be used to address challenges and implement a cybersecurity plan with my guest, Mohammed Al Afoo. Techniques discussed include non-repudiation, anomaly detection, perimeter protection, allow-listing, and more.
39 episodes