Top 20 ICS Cybersecurity Practices (Tips and Tricks)
Time & Location
About the Event
Our upcoming webinar will discuss some tips and tricks to closing gaps that may be in your existing cybersecurity programs. aeSolutions has done a host of CyberPHA Industrial Cyber Risk assessments and we’ve identified 20 common findings for the end-users or owner operators that mitigate risk, address gaps, and program building in areas that make a core difference, regardless of your program’s maturity. We refer to these as the Top 20 Practice Areas of industrial cybersecurity.
What is the purpose of the Top 20 Security Practices
- To provide a comprehensive list of 20 security items that when defined and implemented cover about 80% of the known vulnerabilities and threats within the ICS cybersecurity space.
How where the Top 20 Security Practices Defined
- aeSolutions Industrial Cybersecurity Practices has completed over 500 aeCyberPHAs along many client interactions on various cybersecurity aspects spanning design, assess, engineer, test, commission, operate and maintain to produce a list of Security Practices that covers 80 % of the challenge's clients face.
How do we use the Top 20 Security Practices
- The Top 20 Security Practices are to be used as key guidewords for cybersecurity program development and alignment and as a prerequisite to role based general ICS cybersecurity training and awareness.
This webinar will illustrate how the Top 20 Practice Areas of industrial cybersecurity can be leveraged as tips and tricks to practical actions for Design, Deploy and Operate & Maintain perspective.