Critical steps to ensure systems are reliable, safe, and resilient To view this email as a web page,
click here | | | TODAY: April 18 TIME: 2:00 PM EDT |
| The unique characteristics of OT systems – legacy equipment, long lifecycles, and the convergence with IT networks – complicates deploying traditional security approaches. And these inherent weaknesses in OT environments create a low-hanging and potentially lucrative target for threat actors, making it critical that security teams take steps to ensure systems are reliable, safe, and resilient. Today at 2pm this panel discussion will dive into OT security strategy best practices and challenges, including: | Working across teams to maintain visibility and define ownership Organizing security’s early and ongoing involvement in procurement Developing and practicing a robust IR and business continuity plan |
| | | |
| Register here to help your organization improve the security of your Operational Technology environment. | |
| | CISO Stories webcasts offer programs with leading IT security vendors moderated by CyberRisk Alliance editorial staff. | View Privacy Policy and Terms and Conditions You are subscribed as: newsletter@newslettercollector.com Unsubscribe here © 2024 CyberRisk Alliance | 400 Madison Avenue, Suite 6C New York, NY 10017 |
|
|
|
..