Acquiring and Operationalizing Threat Intelligence for OT Environments
Security practitioners have been working hard to find ways to operationalize threat intelligence for IT environments. But with many security teams now being put in charge of OT security as well, understanding and mitigating OT threats is a whole different ball game. From uptime to visibility and asset discovery, CISOs are struggling to plug holes in these networks, some of which employ out-of-support operating systems and devices that cannot be switched off or replaced.
What are the nuances for gathering TI for such OT environments? Are there services and specialist feeds available? How do you leverage them effectively and continuously, tying back cybersecurity concerns contextual to the business, back to the shop floor OT devices and machines? What are the challenges to rolling out mitigations, based on intelligence from the threat landscape? This session provides answers.