Discussion by members of the ICS Village consortium about the design and launch of the CIISAp apprenticeship program that links rigorous academic classes and educational training with real-world job rotations at leading industrial companies to help students identify and prevent cyber vulnerabilities and attacks on industrial control systems (ICS) and operational technologies (OT).
talk-data.com
Topic
operational technology
3
tagged
Activity Trend
Top Events
Top Speakers
This episode examines how a user checking personal email on an application host in a commercial building could compromise the building’s HVAC, central plant equipment and controllers. It discusses how downstream devices are at risk and how attackers with knowledge of building control systems may exploit interoperability. The talk walks through the events in order and the remediation steps, and what actions may have inflamed attackers rather than stopped them.
Proactive Vulnerability Management in OT requires a deep dive into the complexities of Operational Technology. Effective management hinges on precise asset identification and a thorough understanding of unique enterprise risks. This approach leads to targeted vulnerability monitoring and patch management, essential in navigating the dynamic landscape of OT security. Emphasize on proactive strategies for vulnerability classification and implementation of robust remediation plans, ensuring a resilient cybersecurity posture in the midst of ever-evolving threats.