Amidst the escalating ransomware and cyber threats, this talk presents a field-tested and proven three-step process developed by Jonathan Pollet and Red Tiger Security to empower senior leadership with clarity regarding OT gaps and connect gaps to an actionable remediation strategy. The process yields a Strategic Roadmap and a multi-year plan for deploying missing technology solutions, updating processes and procedures, and elevating workforce knowledge to mature the OT cybersecurity program, including a budgetary cost estimate with traceability to help secure funding.
talk-data.com
Topic
ot cybersecurity
4
tagged
Activity Trend
Top Events
Top Speakers
An OT cybersecurity talk presenting a field-tested three-step process to empower senior leadership to identify OT security gaps and connect them to an actionable remediation strategy. The process yields a Strategic Roadmap with a multi-year plan for deploying missing technology, updating processes, and elevating workforce knowledge, along with a budgeting estimate to help secure funding.
Jonathan Pollet and Red Tiger Security present a field-tested three-step process to empower senior leadership to identify gaps in OT security and connect the gaps to an actionable remediation plan. The process yields a Strategic Roadmap with a multi-year plan for deploying missing technology solutions, updating processes, and elevating workforce cybersecurity maturity, along with a budget estimate to secure funding for necessary investments. Drawing on years of hands-on experience across critical infrastructure environments, the talk shares practical techniques and stories from implementing this methodology.
Panel discussion exploring the intersection of human expertise and advanced technology to strengthen cybersecurity for critical infrastructure, focusing on improving cyber hygiene and leveraging OT site inspections with automation.