Recorded: Securing Against Insider Threats and Tribal ICS Knowledge

How to secure ICS against insider threats

The long-held belief that security by obscurity, system and process complexity, air gapping, and IT security controls are sufficient to protect chemical plants is no longer valid in the wake of WannaCry's attack on Honda and Renault plants earlier this year. Insiders, though, are not constrained by the same security controls that defend against outsiders since they have tribal knowledge of systems, security, and process to act maliciously. This recorded webinar focuses on fundamental security best practices that address the insider threat, but also help prevent the burgeoning outsider one.