A discussion with Ashley Van Hoesen of Wolfe Evolution on OT Cybersecurity. She discusses how this can differ from IT Cybersecurity and provides actionable steps that can be taken.
Some key points in the presentation:
:31 Slideshow Start
:39 Secure Inventory
:43 Remote Access
:47 Vulnerabilities
:51 Incident Response
:55 Penetration Testing
:58 EvoAssess
1:00 Steps: Explore, Visualize, Organize, Locate, Verify, Enhance
1:05 Top 5 Critical Controls
1:07 Contact Info
1:07 Q&A – Defense In Depth