top of page

4 OT Cyber Incidents and How to Stop Them

How might operational technology be impacted in a cyber incident? Opportunistic attacks cast at OT operations, Credential Access and exploitation in ICS networks, Destructive Wipers, and targeting of ICS-specific protocols. To address these types of incidents, security leaders need to know what OT they operate and how it all communicates, what product vulnerabilities to hunt for, threat intelligence for the OT/ICS arena, and how to maximize information, tools and partnerships to take action.

Speakers

Danielle Jablanski

Nozomi Networks

OT Cybersecurity Strategist

bottom of page