WEBINAR: Secure Operations Technology - A Network Engineering Methodology for High-Consequence Automation
In very consequential OT/industrial networks information is an asset, but also a threat. All cyber-sabotage attacks are information. The only way a control system can change from a normal state to a compromised state is if attack information somehow enters the system. A complete inventory of incoming information flows is also a complete inventory of attack vectors.
This webinar introduces Secure Operations Technology - a network engineering methodology that fits between engineering and cybersecurity disciplines under the DoE/INL Cyber-Informed Engineering (CIE) umbrella.