The Purdue Model in OT security

  Рет қаралды 2,752

OTbase

OTbase

Күн бұрын

One of the biggest misconceptions in OT security is that the Purdue model can act, or even was intended, as a security architecture. Ralph explains why it can even be counter-productive and lead to LESS security.
#otsecurity #purduemodel
Download our FREE OT handbooks: bit.ly/OTbaseH...
Request a demo of OTbase: bit.ly/OTbaseDemo
Follow us on social:
LinkedIn: / langnergroup
Twitter: / langnergroup
For more about OTbase, our mission, and our company, visit ot-base.com

Пікірлер: 5
@millerdp
@millerdp 5 ай бұрын
Ralph, thank you for the enlightening and useful discussion. Much appreciated.
@brianduffy8768
@brianduffy8768 5 ай бұрын
Zoning and Conduit as per 62443, instead of purdue thinking. Zone the Control Systems for network Segmentation.
@Atreus21
@Atreus21 4 ай бұрын
I don't understand. What is the purpose if the zones then?
@OTbase
@OTbase 4 ай бұрын
Zones have nothing to do with the Purdue model.
@Atreus21
@Atreus21 4 ай бұрын
​@OTbase sorry, not zones - layers. The layers from 1 to 4. What is the purpose of organizing it like that if all that really matters is network segregation? Sorry again, my questions are uninformed. I'm new to this stuff.
Is The Purdue Model Dead?
30:39
S4 Events
Рет қаралды 6 М.
The Stuxnet Story: What REALLY happened at Natanz
37:38
OTbase
Рет қаралды 168 М.
What's in the clown's bag? #clown #angel #bunnypolice
00:19
超人夫妇
Рет қаралды 23 МЛН
Хасанның өзі эфирге шықты! “Қылмыстық топқа қатысым жоқ” дейді. Талғарда не болды? Халық сене ме?
09:25
Демократиялы Қазақстан / Демократический Казахстан
Рет қаралды 341 М.
She's very CREATIVE💡💦 #camping #survival #bushcraft #outdoors #lifehack
00:26
1 сквиш тебе или 2 другому? 😌 #шортс #виола
00:36
What is a Digital Factory | 2024
21:07
4.0 Solutions
Рет қаралды 4,9 М.
Event-Driven Architecture (EDA) vs Request/Response (RR)
12:00
Confluent
Рет қаралды 157 М.
The Auto Wreckers of OT | OT After Hours, An OT Security Podcast
48:32
Verve Industrial, A Rockwell Automation Company
Рет қаралды 43
Why you must have a network inventory
26:36
OTbase
Рет қаралды 231
Building a Secure OT Network | SANS ICS Concepts
36:19
SANS ICS Security
Рет қаралды 25 М.
A Tale Of Two (Very Different) Secure ICS Architectures
26:08
S4 Events
Рет қаралды 4,8 М.
Basic Kerberos Authentication
12:15
F5 DevCentral
Рет қаралды 101 М.
From Edge Devices to the Cloud: Trelleborg's Data Revolution
9:36
4.0 Solutions
Рет қаралды 1,4 М.
OT Security 101 Training: How to Get Started
58:11
Industrial Defender
Рет қаралды 12 М.
De-central autonomous asset discovery in OT-BASE
6:19
OTbase
Рет қаралды 1,5 М.
What's in the clown's bag? #clown #angel #bunnypolice
00:19
超人夫妇
Рет қаралды 23 МЛН