IT is only half the battle: Strategies for real-time protection of OT from cyber attack. Malicious actors continue to demonstrate their willingness to conduct cyber attacks against critical Operational Technology (OT) assets, including rail locomotives and wayside assets. NSA and CISA recently introduced recommendations to build cyber resiliency. This session will cover time and battle-tested cyber tactics, techniques and procedures to defend your OT from devastating attacks. We will discuss core concepts such as continuous monitoring, intrusion detection, cyber situational awareness and incident response and how some of these strategies will also provide cost reductions through preventive maintenance.">
IT is only half the battle: Strategies for real-time protection of OT from cyber attack. Malicious actors continue to demonstrate their willingness to conduct cyber attacks against critical Operational Technology (OT) assets, including rail locomotives and wayside assets. NSA and CISA recently introduced recommendations to build cyber resiliency. This session will cover time and battle-tested cyber tactics, techniques and procedures to defend your OT from devastating attacks. We will discuss core concepts such as continuous monitoring, intrusion detection, cyber situational awareness and incident response and how some of these strategies will also provide cost reductions through preventive maintenance.
Presented By:
Learning Objectives:
1. A review of different protocols for control devices found on locomotives and wayside assets
2. A review of different types of attacks on OT assets
3. A review of techniques such as real-time continuous monitoring and analysis, intrusion detection, intrusion prevention, and incident response
4. Using Real-time status data from rail assets to save money
CEUs:
0.1