Acquiring & Using Threat Intelligence in OT Environments
Course
Mihirr P Thaker, Yogesh Kulkarni, and Aditya Sarangapani explore threat intelligence for OT security. Learn strategies for asset visibility, cybersecurity resilience, and mitigating risks in legacy systems.
Security practitioners have been striving to operationalize threat intelligence for IT environments, but OT security presents a unique set of challenges
Security teams responsible for OT security and CISOs face difficulties in securing these networks, dealing with issues such as maintaining uptime, achieving visibility and asset discovery. Many of these networks use outdated operating systems and irreplaceable devices, complicating the task further.
The session will cover:
- The nuances of gathering threat intelligence for OT environments and the availability of specialist feeds
- Effective use of intelligence, linking cybersecurity concerns to business context and OT devices
- Challenges in implementing threat intelligence-based mitigations in OT settings
Here is the course outline:
Acquiring And Operationalizing Threat Intelligence In OT Environments |