Learn the 6-step process to identify, test, & apply software updates & patches successfully in OT environments.
Chapters:
0:00 Introduction
3:10 Surge in Public Vulnerabilities of OT Software
5:00 Increased Targeting of Industrial Organizations by Attackers
8:28 Need for a Paradigm Shift in OT Security Strategies
12:18 Hidden Vulnerabilities: Risks in "Patched" Systems
13:45 Balancing IT and OT: The Challenge of Competing Domains
15:37 A Practical and Safe 6-Step Approach for OT Security
19:33 Key Principle #1: "Think Global, Act Local"
21:28 Benefits of the "Think Global, Act Local" Strategy
22:44 Utilizing Verve's OT Security Management Platform
25:20 Key Principle #2: Comprehensive OT Risk Assessment Beyond Patching
26:59 Deep Asset Analysis for Effective OT Patch Management
28:23 Identifying Non-compliant Software in ICS Systems
29:47 Automated Analysis for OT-Safe Vulnerability
31:01 ISA 99 Guidelines for Prioritizing Patch Urgency
31:30 Prioritization Criteria: Exploitability and Compensating Controls
34:15 Adapting to Emerging Vulnerabilities: Case of Log4
35:53 Compliance with Regulatory Patching Requirements
36:56 Applying the 80-20 Rule in Patch Implementation
38:03 Establishing Criticality for Patch Prioritization
39:15 Developing Remediation and Mitigation Plans
42:42 Configuration Compliance as a Mitigation Strategy
44:12 Best Practices for Patch Testing
46:34 Automating Endpoint Remediation Deployment
48:13 Monitoring and Measuring Improvement in Vulnerability Management
49:26 The "Think Global, Act Local" Approach in Reducing Security TCO (Total Cost of Ownership)