The post Webinar Recording: How to Protect Vital Industrial Assets from the Industrial Internet of Threats first appeared on the ISA Interchange blog site.
During the 19th century, settlers saw it as their Manifest Destiny to settle the American West. But they found their lands under attack by the cattlemen surrounding them.
The “Manifest Destiny” of industrial process and power generation companies is under similar assault. Bands of outlaws, or hackers, are cutting down perimeter-based defenses and successfully infiltrating process control networks. They are aided by growing attack surfaces created by the Industrial Internet of Things (IIoT) adoption; it is why IIoT is often referred to as the Industrial Internet of Threats. These and other factors put the highly complex, proprietary, and heterogeneous cyber assets in the plant at risk.
Watch this webinar learn more about landscape of ICS cybersecurity solutions. We will share how ISA advises companies to proceed and discuss “gotchas” that can derail an ICS cybersecurity initiative.
ISA offers standards-based industrial cybersecurity training, certificate programs, conformity assessment programs, and technical resources. Please visit the following ISA links for more information:
Source: ISA News