Talk With an Expert

Let's face it, you are probably compromised. What next?

Let's face it, you are probably compromised. What next? (PDF, 2.97MB)Published: 15 Dec, 2014
Created by:
Jonathan Thyer

Long live the operator! At a point in time, they were the backbone of the phone system, ensuring that calls were routed where they needed to go. In many organizations, an operator still exists in one form or another. A version of this operator is common in a Security Operation Center (SOC) and many Industrial Control System (ICS) networks. In the ICS and Supervisory Control and Data Acquisition (SCADA) world, centralized security monitoring is either non-existent or so limited that the information provided does not paint an accurate security picture.