When it comes to cybersecurity it has always been about what threats are you facing, or what kinds of vulnerabilities are imminent. Threats and vulnerabilities are something you need to be aware of and protect against, the reality is if you don’t know the consequence or if there is no consequence from a threat, then why bother protecting against it. A consequence-based cyber risk management approach is vital for protecting OT and ICSes across the board.
--------
--------
How to Protect Removable Media from Ongoing Attacks
Use of removable media in the industrial sector today is continuing to grow and it is just as vulnerable now as it has been over the past five to ten years. A new report is out that analyzes USB-borne malware and some of the results are very interesting.
--------
19:57
--------
19:57
Reduce Risk to People and Industrial Assets with ISA/IEC 62443
People, process and technology are three critical components to any security program. When they all are working and in sync, everything comes together in a perfect harmony – and systems stay safe and secure and up and running.
--------
33:15
--------
33:15
Applying ISAIEC 62443 Can Boost Defense in Depth
To create a secure manufacturing enterprise, you need to apply defense in depth. That means at a very basic level, if a threat actor is able to get through one level of defense, there are plenty more for them to wade through. A solid defense in depth program can truly halt an attack or really slow it down.
--------
36:27
--------
36:27
Launching an ISA/IEC 62443-driven Cybersecurity Program
Most industrial firms lack a firm foundation of cybersecurity protection. Bad actors are on the rise and are constantly revising their attack tactics. Learn the best way to start a new journey along the ISA/IEC 62443 protection pathway.
Welcome to Today with ISSSource! Hear experts discuss hot topics in physical and cyber security and safety covering manufacturing and critical infrastructure.