Hi [[ session.user.profile.firstName ]]

Best Practices For Building The Right ICS Security Rulesets

A confluence of factors has put OT networks online and more susceptible to cyber attacks. Without addressing threats targeting the OT network, any manufacturing facility, industrial operation or critical infrastructure can be ground zero to a devastating attack. When tasked with creating the rule sets that are optimized for ICS environments, security experts must take into consideration a number of key areas.
Recorded Feb 26 2019 55 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ran Rayn & Michael Rothschild
Presentation preview: Best Practices For Building The Right ICS Security Rulesets

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
Cyber threat protection for industrial networks
Indegy, the leader in industrial cyber security, protects Industrial networks against cyber threats, malicious insiders and human error, by providing visibility and control. We offer the most advanced Industrial Cyber Security Suite, leveraging a hybrid of policy-based monitoring and networks anomaly detection, with unique device integrity checks for full visibility into ICS activities and threats.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Best Practices For Building The Right ICS Security Rulesets
  • Live at: Feb 26 2019 5:00 pm
  • Presented by: Ran Rayn & Michael Rothschild
  • From:
Your email has been sent.
or close