Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
Automating Operational Technology (OT) vulnerability evaluation
- This topic has 0 replies, 1 voice, and was last updated 3 years, 2 months ago by .
-
Topic
-
The following article from Automation.com recommends automating the Operational Technology (OT) vulnerability evaluation process and increased visibility, to improve OT networks resilience. In addition, cybersecurity experts emphasized the importance of having visibility into the networks we are trying to protect.
What are good methods or tools to automate ICS and SCADA vulnerability evaluation?
What are the industry standards that utilities can implement to increase the visibility of their SCADA and ICS networks?
You must be logged in to reply to this topic.