When digital modernization forces companies to address plant cyber risks, invariably the C-suite turns to the CISO for answers. Unfortunately, nearly all IT security tools are inappropriate for use within ICS environments. This will focus on requirements and how to evaluate and select the right tools to secure without disruption.