A set of rules that dictate how potentially compromised OT devices should be isolated and managed to prevent further risks.
Read MoreFind what you're looking for by selecting the first letter of your topic.
Techniques for securing communications and data in OT environments through encryption.
Investigative techniques to analyze cyberattacks and breaches in OT systems.
Best practices and routine measures to maintain the security and health of OT networks.
The process of managing and mitigating the impact of cybersecurity incidents in OT environments.
Information about cyber threats relevant to OT environments for proactive defense.
Integrated systems involving physical processes and digital controls.
Education and training for OT personnel to recognize and respond to potential threats.
A structured set of guidelines to secure OT systems, such as NIST or IEC 62443.
Techniques to identify unauthorized access or exfiltration of sensitive data in OT environments.
Recording events or activities in OT systems for monitoring, analysis, and auditing purposes.
Techniques to remove sensitive information from data before sharing or storing it in non-secure environments.
Security measures that use decoys or traps to detect and divert attackers in OT networks.
An advanced network filtering technology that examines the contents of data packets to identify malicious traffic.
Preconfigured usernames and passwords on devices, often exploited by attackers if not changed.
A cyberattack that disrupts the availability of OT systems by overwhelming them with excessive requests or traffic.
A cybersecurity approach focused on identifying and quickly mitigating threats to minimize impact.
Verifying the identity of OT devices before granting access to a network or system.
Strengthening OT devices by applying security configurations and disabling unnecessary features.
The investigation and analysis of cyber incidents in OT environments to uncover an attack's root cause and scope.
A strategy to restore OT operations quickly after a cyberattack or catastrophic event.
An OT architecture that uses distributed devices to monitor and control industrial processes