Podchaser Logo
Home
Industrial Cybersecurity Part 3: Tools for Implementing your Cybersecurity Plan

Industrial Cybersecurity Part 3: Tools for Implementing your Cybersecurity Plan

Released Friday, 13th May 2022
Good episode? Give it some love!
Industrial Cybersecurity Part 3: Tools for Implementing your Cybersecurity Plan

Industrial Cybersecurity Part 3: Tools for Implementing your Cybersecurity Plan

Industrial Cybersecurity Part 3: Tools for Implementing your Cybersecurity Plan

Industrial Cybersecurity Part 3: Tools for Implementing your Cybersecurity Plan

Friday, 13th May 2022
Good episode? Give it some love!
Rate Episode

In part 1 of this series, we discussed emerging threats and attack vectors facing the industrial automation space. In part 2 we covered Operational Technology (or OT) and how to move from a reactive approach to cybersecurity to a proactive approach. In Part 3 we’ll cover specific tools that can be used to address challenges and implement a cybersecurity plan with my guest, Mohammed Al Afoo. Techniques discussed include non-repudiation, anomaly detection, perimeter protection, allow-listing, and more. 

Show More

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features