ICS Cybersecurity - You Cannot Secure What You Cannot See

    ICS Cybersecurity - You Cannot Secure What You Cannot See

    With smarter, integrated automation comes a difficult challenge that has repercussions from the boardroom to manufacturing operations: ICS cybersecurity. It is generally well understood that you cannot secure what you cannot see. That is why accurate, up-to-date visibility of the system inventory is a key element of any cybersecurity solution. This paper discusses industry best practices for hardening ICS cybersecurity, focusing on the first and most crucial step: ICS inventory management.