ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Mastering OT/ICS Cybersecurity — Part 2: Building a ROCK SOLID 62443 Cybersecurity Management System

Автор: Mike Holcomb

Загружено: 2025-07-01

Просмотров: 4978

Описание: How do we build a ROCK SOLID 62443 Cybersecurity Management System (CSMS)? How do we effectively protect our OT / ICS / SCADA / IACS environments from cyber attacks? In this part, we'll jump start our 62443 learning by covering what OT/ICS cybersecurity is, why it is important to the world and how to defend critical infrastructure environments like power plants and water treatment facilities. After taking a quick look at other standards and frameworks like NIST 800-82, ISO 27001/ISO 27002 and the NIST CSF, we'll dive into the six phases of building a successful OT/ICS cybersecurity management program based on ISA/IEC 62443.

Questions? Drop them in the Comments and I'll be sure to answer!

00:00 Introduction
02:22 Agenda
03:03 62443 Cybersecurity Fundamentals Specialist Certification
06:12 What Are We Protecting?
07:56 Differences Between OT / ICS / SCADA / IACS
11:30 What is OT/ICS Cybersecurity?
19:39 IT Cybersecurity Compared to OT Cybersecurity
23:48 How Does It All Work in Securing Critical Infrastructure?
23:30 OT/ICS Cybersecurity Myths
28:01 Types of Attackers (State Adversaries, Hacktivists, Ransomware Operators)
30:39 Where Do We Go From Here? OT/ICS Attack Timeline
33:00 Why a OT Cybersecurity Management System (CSMS)?
34:45 NIST Cybersecurity Framework (CSF)
39:15 NIST 800-82
47:36 ISO 27001 / ISO 27002
48:42 The ISA/IEC 62443 Standards
50:11 International Society of Automation (ISA) & International Electrotechnical Commission (IEC)
52:26 ISA-99
56:58 The IACS Security Lifecycle
59:12 Phase 1: Assess
1:01:56 Target Security Levels (SL-T)
1:06:25 Phase 2: Develop & Implement
1:09:05 Phase 3: Maintain
1:12:50 ISA-62443-2-1
1:13:23 What Makes a Successful OT CSMS?
1:16:37 Phases of Creating a 62443 OT Cybersecurity Management System (CSMS)
1:17:31 Phase 1: Initiate
1:21:57 Phase 2: High-Level Risk Assessment
1:26:35 Phase 3: Detailed Risk Assessment
1:28:35 Phase 4: Policies
1:33:02 Awareness of Policies & Responsibilities
1:34:57 Phase 5: Countermeasures
1:36:45 Phase 6: Maintaining and Improving the CSMS
1:39:13 Review Questions
1:45:17 THANK YOU!!!

Link to Course Materials: https://drive.google.com/drive/folder...

Thank you for watching!!!

Looking for more on ICS/OT cyber security?

Mike Holcomb
linkedin.com/in/mikeholcomb
mikeholcomb.com
   / @utilsec  

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Mastering OT/ICS Cybersecurity — Part 2: Building a ROCK SOLID 62443 Cybersecurity Management System

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Intro to OT/ICS Penetration Testing (Part 1): Exploring OT/ICS Penetration Testing Fundamentals

Intro to OT/ICS Penetration Testing (Part 1): Exploring OT/ICS Penetration Testing Fundamentals

A GUIDE to Cybersec in 2026 | SOC Analyst, Pentester, Net sec engineer | Salaries, certs, duties

A GUIDE to Cybersec in 2026 | SOC Analyst, Pentester, Net sec engineer | Salaries, certs, duties

Networking Basics (2026) | What is a switch, router, gateway, subnet, gateway, firewall & DMZ

Networking Basics (2026) | What is a switch, router, gateway, subnet, gateway, firewall & DMZ

The IEC 62443 Standards Plainly Explained

The IEC 62443 Standards Plainly Explained

Master OT/ICS Cybersecurity Before It’s Too Late — Part 1: ISA/IEC 62443 Made Simple

Master OT/ICS Cybersecurity Before It’s Too Late — Part 1: ISA/IEC 62443 Made Simple

What is OT | What are OT Cyber Security Challenges | OT Security Solutions | What is  ICS and SCADA

What is OT | What are OT Cyber Security Challenges | OT Security Solutions | What is ICS and SCADA

2. IEC 62443 Explained | The Gold Standard for Industrial Cybersecurity & OT Protection

2. IEC 62443 Explained | The Gold Standard for Industrial Cybersecurity & OT Protection

How to  Build an OT Security Program from Scratch?

How to Build an OT Security Program from Scratch?

РАСКРЫТ ЛУЧШИЙ СПОСОБ ПОДГОТОВКИ К СЕРТИФИКАЦИИ ISA/IEC 62443

РАСКРЫТ ЛУЧШИЙ СПОСОБ ПОДГОТОВКИ К СЕРТИФИКАЦИИ ISA/IEC 62443

The Five ICS Cybersecurity Critical Controls Webcast

The Five ICS Cybersecurity Critical Controls Webcast

Getting Started in ICS/OT Cyber Security - 20+ Hours - Part 1 (Course Introduction)

Getting Started in ICS/OT Cyber Security - 20+ Hours - Part 1 (Course Introduction)

Building a Secure OT Network | SANS ICS Concepts

Building a Secure OT Network | SANS ICS Concepts

я ПРОНИК в кабинет HR рекрутера. Они видят ВСЕ

я ПРОНИК в кабинет HR рекрутера. Они видят ВСЕ

How to Implement Network Segmentation in OT | Verve is now Rockwell Automation SecureOT

How to Implement Network Segmentation in OT | Verve is now Rockwell Automation SecureOT

Вся IT-база в ОДНОМ видео: Память, Процессор, Код

Вся IT-база в ОДНОМ видео: Память, Процессор, Код

How to Perform Effective OT Cyber Security Risk Assessments

How to Perform Effective OT Cyber Security Risk Assessments

Getting Started in ICS/OT Cyber Security - 20+ Hours - Part 2 (ICS/OT Cyber Security Overview)

Getting Started in ICS/OT Cyber Security - 20+ Hours - Part 2 (ICS/OT Cyber Security Overview)

Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)

Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)

What is OT Security | Introduction to OT Cybersecurity | Knowledge and Skills needed for OT Security

What is OT Security | Introduction to OT Cybersecurity | Knowledge and Skills needed for OT Security

OSINT для новичков: найдите всё о юзернейме и фото с Sherlock и Google Dorks!

OSINT для новичков: найдите всё о юзернейме и фото с Sherlock и Google Dorks!

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]