DescriptionIndustries that use industrial control systems are looking to add new capabilities and improve operational efficiencies through the latest digital innovations. But as operational technology (OT) environments incorporate IT-based devices and applications, it creates new pathways for cyber criminals to exploit critical production systems. Despite consensus on attack surface expansion and shared management challenges responding to attacks, there remains high degree of variation in security practices and capabilities, including practices for securing legacy and modern equipment. To protect the critical infrastructure in OT, industrial organizations need to harness the power of segmentation to secure their resources, systems, and users, as well as minimize the risk of attackers gaining access to their critical infrastructure.
During this webinar, we will explore the fundamentals of segmentation through the combination of traditional methods used and the modern alternatives available that provide protection for the mix of systems used in OT environments. This 45-minute session will discuss the:
On the core course: Introduction to the Threat Landscape; you will learn about the cyberthreat landscape. This landscape includes the threats that endanger computer networks, the cast of bad actors who are behind these threats, and the cybersecurity first principles that, if followed, can keep you and your computer network safe.
On the Elective Course: Getting Started in Cybersecurity; you will gain a technical introduction to Cybersecurity. This elective is ideal for individuals in technical roles that require a more in-depth understanding of the fundamentals of cybersecurity. This course is also ideal for people that want to pursue a technical job in cybersecurity
Effective technical instruction must be highly varied and interactive to keep attention levels high, promote camaraderie and teamwork between the students and instructor, and solidify knowledge through hands-on learning.
3a8082e126