Watch this video and more on RealPars

Watch this video and more on RealPars

Subscribe Learn More

Already subscribed? Sign in

4. Implementing Cyber Security Controls in an ICS Environment – Protect

Implementing Industrial Cyber Security • 5m 29s

Up Next in Implementing Industrial Cyber Security

  • 5. Implementing Cyber Security Contro...

    In this video, we will discuss the third step of the NIST framework, which is called “Detect”.
    After identifying and protecting your devices, you will want to have systems in place to monitor them in order to ensure that the protections are working properly and to detect any unusual activity.

  • 6.Implementing Cyber Security Control...

    In this video, we will discuss the two steps of the NIST framework: “Respond” and “Recover”

    Responses to a cyber-attack may include restoring backups, changing firewall rules, blocking IP addresses, modifying permissions, or using automated intrusion prevention systems to block suspicious traffi...

2 Comments