OT Security for IT Professionals

An Introduction to Industrial Cyber Controls Handbook

Written by Edward Amoroso, CEO of TAG Cyber & Andrew Ginter, Vice President of Industrial Security at Waterfall Security

An Introduction to Industrial Cyber Controls

As a globally recognized expert in the field of industrial control systems security, Andrew Ginter often observes that a common approach to industrial cybersecurity is to protect operational technology (OT) with the same tools and approach as we use when we protect information technology (IT). Demystifying this concept is the topic handled in this series of articles. Recruiting Dr. Edward Amoroso – a veteran cyber and information security professional, professor and author – these two savvy professionals sat down and wrote a series of articles that every IT professional charged OT security should read.  

Program Outline:

  • Article #1 – an overview of the OT landscape, including an outline of the influential Purdue model for manufacturing and industrial networks
  • Article #2 – an insight into how hackers have had success to date breaking into OT networks
  • Article #3 – outline of the SCADA vulnerabilities associated with typical physical bus architectures
  • Article #4 – how innovative technology such as unidirectional gateways are commonly used to protect OT networks from Internet-exposed IT networks
  • Article #5 – a glimpse into the future of OT and SCADA systems in critical infrastructure

FILL OUT THE FORM TO ACCESS HANDBOOK

Fill out this form to access handbook:

Fill out this form to access handbook: