Rate this post
Five cybersecurity controls can be utilized together to create an efficient and effective industrial control system (ICS) or operational technology (OT) security program. This paper identifies those controls and the rationale behind them so that organizations can adapt the controls to fit their environment and risks. The controls are intended to be outcome focused instead of prescriptive in nature. They are also intelligence-driven in that they
have been chosen based on the analysis of recent compromises and attacks in industrial companies around the world.
Views: 18


















































