Recorded: ICS Cybersecurity: What Happens when the Eggshell Breaks

    What happens when the cybersecurity eggshell breaks

    In this webinar, we discuss how to utilize the inventory and threat assessment to develop a layered defense architecture for a process control network.  We explore the most common vulnerabilities of perimeter-based cybersecurity approaches and in-depth defenses that will help your organization immediately detect improper changes. The pros and cons of different approaches are also discussed. (Part 3 of a 3-part series)