talk-data.com talk-data.com

Topic

operational technology

3

tagged

Activity Trend

1 peak/qtr
2020-Q1 2026-Q1

Activities

3 activities · Newest first

Discussion by members of the ICS Village consortium about the design and launch of the CIISAp apprenticeship program that links rigorous academic classes and educational training with real-world job rotations at leading industrial companies to help students identify and prevent cyber vulnerabilities and attacks on industrial control systems (ICS) and operational technologies (OT).

This episode examines how a user checking personal email on an application host in a commercial building could compromise the building’s HVAC, central plant equipment and controllers. It discusses how downstream devices are at risk and how attackers with knowledge of building control systems may exploit interoperability. The talk walks through the events in order and the remediation steps, and what actions may have inflamed attackers rather than stopped them.

Proactive Vulnerability Management in OT requires a deep dive into the complexities of Operational Technology. Effective management hinges on precise asset identification and a thorough understanding of unique enterprise risks. This approach leads to targeted vulnerability monitoring and patch management, essential in navigating the dynamic landscape of OT security. Emphasize on proactive strategies for vulnerability classification and implementation of robust remediation plans, ensuring a resilient cybersecurity posture in the midst of ever-evolving threats.