
To meet these growing regulatory requirements and defend our critical infrastructure from growing attacks, we need an approach that goes beyond perimeter segmentation or network detection. We need to take a “pro-active” approach that protects these sensitive environments.
In this session, John Livingston will describe how industrial organizations can achieve regulatory compliance as well as increased defensive measures within these sensitive OT environments. Key topics covered will teach you how to:
- Address OT regulatory requirements such as consistent vulnerability and patch management
- Manage endpoint risks effectively through considering mitigating controls and operational realities
- Deliver on CISO/IT security requirements on sensitive OT networks