Industrial Cybersecurity Part 3: Tools for Implementing your Cybersecurity Plan

Published: May 13, 2022, 5:11 p.m.

In part 1 of this series, we discussed emerging threats and attack vectors facing the industrial automation space. In part 2 we covered Operational Technology (or OT) and how to move from a reactive approach to cybersecurity to a proactive approach. In Part 3 we’ll cover specific tools that can be used to address challenges and implement a cybersecurity plan with my guest, Mohammed Al Afoo. Techniques discussed include non-repudiation, anomaly detection, perimeter protection, allow-listing, and more.