Securing Operational Technology is a challenge for many organizations that depend on the continual availability of ICS/SCADA systems to manufacture their products. To view this email as a web page,
click here | | | NEXT WEEK: April 4, 2024 TIME: 2:00 PM EDT |
| Securing Operational Technology is a challenge for many organizations that depend on the continual availability of ICS/SCADA systems to manufacture their products. For example, maintenance windows for security patches are often hard to find and raise concerns about ““breaking”” systems. Furthermore, OT systems require Internet access and, therefore, are vulnerable to threat actors who are often nation-states. In this CISO Stories webinar, panelists share their experiences dealing with the security of OT in their organizations. Save your seat now for our webcast on April 4th at 2pm ET to hear them discuss best practices and tools developed by a cross sector task force of CISOs, highlighting: | Gaining senior management support for OT security Organizing an incident response process Improving the security of suppliers providing OT equipment and systems Current and proposed OT security regulations and standards Addressing technical debt Effective security controls and compensating controls |
| | | |
| Register now for key insights and tools to help your organization improve the security of your Operational Technology environment. | |
| | CISO Stories webcasts offer programs with leading IT security vendors moderated by CyberRisk Alliance editorial staff. | View Privacy Policy and Terms and Conditions You are subscribed as: newsletter@newslettercollector.com Unsubscribe here © 2024 CyberRisk Alliance | 400 Madison Avenue, Suite 6C New York, NY 10017 |
|
|
|
..