ON-DEMAND WEBINAR
Do No Harm: OT-Native Approach for Network Monitoring and Cybersecurity
Original Air Date: 7/24/24
Meet the Speaker
Nick Shaw
Principal Advisory Solution Architect
Operational Technology (OT) environments face increasingly sophisticated threats, making tailored cybersecurity strategies essential. Traditional IT security methods fall short in ICS/OT environments, An OT native approach is vital to protect critical infrastructure while maintaining operational integrity.
In this session, Nick Shaw, Principal Advisory Solution Architect, dives into the seven principles of OT cyber-network visibility and monitoring and how the Dragos Platform supports organizations in implementing a cybersecurity program built for OT environments.
We discuss the following key elements for effective Network Monitoring and Cybersecurity:
- Implement a Do No Harm Approach: Enabling 100% uptime with a passive first approach, with active to fill the gaps
- Maintain a Comprehensive Asset Inventory: Importance of cataloging OT/IT/IoT devices across all levels of the Purdue Model.
- Gain Deep Insights: Implement methods for detailed monitoring of OT system traffic.
- Enable Practical Vulnerability Management: How to prioritize vulnerabilities when patching isn't an option.
- Utilize OT-Focused Threat Detection: Go beyond anomalies with OT CTI to identify OT threats.
- Drive Operational Value: Provide insights and root cause analysis to support operations.
- Integrate with IT: Add OT monitoring into existing IT security operations.
Watch this on-demand webinar to learn how the Dragos Platform can transform your ICS/OT cybersecurity strategy with a "Do No Harm" approach.
Boston Beer Transforms OT Cybersecurity & Reduces Costs
The 7th annual OT Cybersecurity Year in Review report synthesizes the latest OT threat intelligence, vulnerabilities in industrial control systems, and defense mechanisms from the trenches – it’s your blueprint to OT cyber resilience.
The Vital Role of OT-Native Network Visibility & Security Monitoring Amid IT Frameworks
This whitepaper is an essential resource for understanding how the Dragos Platform provides the most comprehensive OT-native network visibility and security monitoring solution.
Benchmarking Guide: Secure Your Industrial Operations with the SANS ICS 5 Critical Controls
The SANS ICS 5 Critical Controls provide a comprehensive, adaptable, and prioritized framework to enhance your OT cybersecurity. This step-by-step guide can help you build a robust cybersecurity program tailored to your organization's unique needs.