A technical discussion on the types of OT cybersecurity assessment methodologies. We discuss the assessment methodologies what, when and how the different types are used. We will discuss how leveraging the different types of cybersecurity assessment on a regular basis will improve your cybersecurity program. In conclusions, a consequences-based risk assessment model is shown that can realign your cybersecurity program with more focused actions, approaches and tools.
The conversation leverages the experience of many years of conducting these various assessment methodologies.
We will end with a live Q&A for the operator owners and end users.
Register today to view the recording: