Missing Links for Managing OT Cyber Risk

Logo
Presented by

Andrew Ginter, VP Industrial Security

About this talk

Managing OT cyber risk is more than cybersecurity – an IT-SEC only approach ignores powerful engineering tools for reducing or even eliminating entire classes of risk – tools that are unique to the OT space. This is the foundation of the methodologies: Security PHA Review (SPR), Consequence-Driven, Cyber-Informed Engineering (CCE), and Secure Operations Technology (SEC-OT). Watch to dig into how IT-SEC, SEC-OT, SPR, CCE and other engineering approaches all fit into the big picture of managing OT cyber risk.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (7)
Subscribers (563)
Waterfall Security’s unbreachable cyber solutions keep the world running. Waterfall’s Unidirectional Gateways and other products combine the benefits of impenetrable hardware and software-based connectivity, enabling 100% safe visibility into industrial operations and automation systems. You don’t have to choose between complete cybersecurity and operational efficiency. Waterfall delivers both. Why Waterfall? • Protect your OT network from ransomware • Profit from business automation’s accessing OT data in real-time • Monitor your OT network safely, for security and intrusions • Adapt in real-time with safe access to cloud-based solutions • Update your OT systems with discipline - safely • Access vendor & other experts with remote screen view