Recorded: ICS Inventory Discovery: The First Step in Implementing ICS Cybersecurity

    ICS Inventory Discovery: The First Step in Implementing ICS Cybersecurity

    Many organizations do not have a reliable inventory of equipment at the process control layer, simply because it is a time-intensive and manual process that requires precious engineering resources.  The effort is often passed over with the hopes that protecting the perimeter will protect the core. However, the increase in the number of attacks on industrial control systems and recent successful attacks exemplify the dangers of not monitoring the process control layer. In this webinar, we explore the process of architecting security controls for a process control network – the first step being building and maintaining an accurate inventory of devices within the PCN. (Part 1 in a 3-part series)