CP 2025_Bridging the IT_OT gap

40:20

As IT and OT converge in industrial environments, cybersecurity risks for manufacturing and critical infrastructure are rising, with manufacturing now the top target for ransomware. This presentation examines the evolving threat landscape, including insights from Dragos incident response cases, and addresses how geopolitical tensions, cybercrime, and hacktivism are increasing risks. It discusses vulnerabilities in legacy OT systems, the dangers of poor IT/OT network segmentation, and third-party access threats, while introducing the Five Critical Controls—ICS Incident Response Planning, Defensible Architecture, ICS Network Monitoring & Visibility, Secure Remote Access, and Risk-Based Vulnerability Management—to help attendees strengthen resilience and better protect their operations against sophisticated cyber threats.

Featured Videos
CP 2025_Bridging the IT_OT gap

As IT and OT converge in industrial environments, cybersecurity risks for manufacturing and critical infrastructure are rising, with manufacturing now the top target for ransomware. This presentation examines the evolving threat landscape, including insights from Dragos incident response cases, and addresses how geopolitical tensions, cybercrime, and hacktivism are increasing risks. It discusses vulnerabilities in legacy OT systems, the dangers of poor IT/OT network segmentation, and third-party access threats, while introducing the Five Critical Controls—ICS Incident Response Planning, Defensible Architecture, ICS Network Monitoring & Visibility, Secure Remote Access, and Risk-Based Vulnerability Management—to help attendees strengthen resilience and better protect their operations against sophisticated cyber threats.

Related videos for "2025"

Similar Videos