The 5th and final Module of the cybersecurity series on ICS Critical Controls for the Water Sector focuses on understanding and managing risk. A successful ICS cybersecurity strategy balances defense and offense.
ICS brings cyber digital controls to aid risk-based management. This training module describes how organizations can identify vulnerabilities by understanding adversaries. This module will include safe and informed mitigation, workarounds, and monitoring for attack preposition and pre-exploitation attack attempts. It will be complete with a nuanced discussion of the probability of exploitation, where, and how an adversary gets into the system.
Watch All Parts in This Series: