The Center for Internet Security's Critical Controls have helped organizations secure their IT systems; how do we apply them to protect ICS and where do we start? The controls arose from careful analysis of how attacker's were able to compromise systems as a way to inform and prioritize the best defense effort. Defending ICS adds several wrinkles, some having to do with causing no harm to the industrial process, others have more to do with the security objectives and particular architectures. This talk will use examples and help you think about the best controls to consider based on recent ICS incidents.
This webcast will provide participants with: