Missing Links for Managing OT Cyber Risk

Presented by

Andrew Ginter, VP Industrial Security

About this talk

Managing OT cyber risk is more than cybersecurity – an IT-SEC only approach ignores powerful engineering tools for reducing or even eliminating entire classes of risk – tools that are unique to the OT space. This is the foundation of the methodologies: Security PHA Review (SPR), Consequence-Driven, Cyber-Informed Engineering (CCE), and Secure Operations Technology (SEC-OT). Watch to dig into how IT-SEC, SEC-OT, SPR, CCE and other engineering approaches all fit into the big picture of managing OT cyber risk.
Waterfall Security Solutions

Waterfall Security Solutions

568 subscribers7 talks
Unbreachable Security, Unlimited Connectivity
Waterfall Security’s unbreachable cyber solutions keep the world running. Waterfall’s Unidirectional Gateways and other products combine the benefits of impenetrable hardware and software-based connectivity, enabling 100% safe visibility into industrial operations and automation systems. You don’t have to choose between complete cybersecurity and operational efficiency. Waterfall delivers both. Why Waterfall? • Protect your OT network from ransomware • Profit from business automation’s accessing OT data in real-time • Monitor your OT network safely, for security and intrusions • Adapt in real-time with safe access to cloud-based solutions • Update your OT systems with discipline - safely • Access vendor & other experts with remote screen view
Related topics