Рет қаралды 65
Interview with Ashley Van Hoesen of Wolfe Evolution on OT (Operational Technology, that is, the plant floor) Cybersecurity. She discusses how this can differ from IT Cybersecurity and provides actionable steps that can be taken.
Some key points in the presentation:
:31 Slideshow Start
:39 Secure Inventory
:43 Remote Access
:47 Vulnerabilities
:51 Incident Response
:55 Penetration Testing
:58 EvoAssess
1:00 Steps: Explore, Visualize, Organize, Locate, Verify, Enhance
1:05 Top 5 Critical Controls
1:07 Contact Info
1:07 Q&A - Defense In Depth