Watch this video and more on RealPars

Watch this video and more on RealPars

Subscribe Learn More

Already subscribed? Sign in

3. Implementing Cyber Security Controls in an ICS Environment – Identify

Implementing Industrial Cyber Security • 4m 31s

Up Next in Implementing Industrial Cyber Security

  • 4. Implementing Cyber Security Contro...

    In this video, we will discuss the second step of the NIST framework: Protect.
    The purpose of this step is to take preventative measures in protecting our industrial control systems.

  • 5. Implementing Cyber Security Contro...

    In this video, we will discuss the third step of the NIST framework, which is called “Detect”.
    After identifying and protecting your devices, you will want to have systems in place to monitor them in order to ensure that the protections are working properly and to detect any unusual activity.

  • 6.Implementing Cyber Security Control...

    In this video, we will discuss the two steps of the NIST framework: “Respond” and “Recover”

    Responses to a cyber-attack may include restoring backups, changing firewall rules, blocking IP addresses, modifying permissions, or using automated intrusion prevention systems to block suspicious traffi...