Learn how to apply foundational OT cybersecurity controls to protect the availability and safety of your ICS environment.
Discussion includes:
• The differences between IT and OT security
• Some of the notorious cyberattacks on OT and why they were successful
The five foundational OT security controls
• How to effectively use an OT cybersecurity solution to defend your systems