There is no consensus as to how to manage OT cyber risk, so when serious incidents occur, it is vitally important that we have a defensible rationale in place for our choices. But - what does a defensible OT security program look like?\n\nIn this webinar, we start with common OT cyber risk fallacies, such as insurance does not keep the lights on and cyber catastrophes are not like hurricanes. We explore powerful new approaches to physical & analog / \"unhackable\" mitigations for OT cyber risk, including: Security PHA Review (SPR), Consequence-Driven Cyber-Informed Engineering (CCE), Secure Operations Technology (SEC-OT), and manual fall-backs. We finish by looking at organizational resistance to robust security measures, such as confusing detection with prevention, statistics with prediction, and \"reverse lottery\" ROI.\nSo while the risk landscape continues to worsen, simple and powerful approaches to managing OT cyber risk are emerging. Join us to explore approaches to security that the world's most secure industrial sites already use routinely.
talk-data.com
Topic
consequence-driven cyber-informed engineering (cce)
1
tagged
Activity Trend
1
peak/qtr
2020-Q1
2026-Q1
Filtering by:
(CS)²AI Online™ Replay: Managing OT Cyber Risk
×