Skip to content
Explore All

Securing Our ICS Systems - Techniques to Stay Secure and Prevent Downtime


Course
Enroll

Abdulhakeem Al Alawi, Gopinath Kishorekumar, Dr. Ali Ismail Awad, Ahmed Al-Bahdoor and Keith Christie-Smith explore security-by-design approaches, vendor selection, zero trust architecture and easy wins to protect ICS systems.

Industrial control systems (ICS) form the backbone of critical infrastructure, and their security is paramount. Implementing robust vulnerability management practices, establishing effective incident response plans, and staying vigilant against ICS-specific malware are crucial steps in safeguarding these vital systems.

In this session, you will learn:

  • How a security-by-design approach can ensure OT systems security;
  • What we can do to ensure they pick the right vendors for protection;
  • How to utilize zero trust architecture to help systems stay protected;
  • What can be done to protect against internal and external threats;
  • Where to implement easy wins to ensure our ICS systems stay secure and prevent downtime.

Here is the course outline:

Securing Our ICS Systems - Techniques to Stay Secure and Prevent Downtime