Recorded: ICS Cyber Threat Assessment: How Vulnerable Are You?

    ICS Cyber Threat Assessment: How Vulnerable Are You?

    Once an organization implements an inventory discovery process, the next step is to identify and prioritize cyber security controls based on potential risk. The stakes are high for industries with process control networks, as the consequences of a successful cyber attack can be particularly devastating – resulting in lost production, damage to equipment, injury or death.  In this webinar, discover a methodology for documenting and prioritizing the security threats to the PCN. (Part 2 in a 3-part series)