Wed, Feb 24 | Microsoft Teams Live Event

Top 20 ICS Cybersecurity Practices  (Tips and Tricks)

Our upcoming webinar will discuss some tips and tricks to closing gaps that may be in your existing cybersecurity programs. aeSolutions has done a host of CyberPHA Industrial Cyber Risk assessments and we’ve identified 20 common findings for the end-users or owner operators that mitigate risk, add
Registration is Closed

Time & Location

Feb 24, 1:00 PM EST
Microsoft Teams Live Event

About the Event

Our upcoming webinar will discuss some tips and tricks to closing gaps that may be in your existing cybersecurity programs.  aeSolutions has done a host of  CyberPHA Industrial Cyber Risk assessments and we’ve identified 20 common findings for the end-users or owner operators that mitigate risk, address gaps, and program building in areas that make a core difference, regardless of your program’s maturity. We refer to these as the Top 20 Practice Areas of industrial cybersecurity.

What is the purpose of the Top 20 Security Practices

  • To provide a comprehensive list of 20 security items that when defined and implemented  cover about 80% of the known vulnerabilities and threats within the ICS cybersecurity space.

How where the Top 20 Security Practices Defined

  • aeSolutions Industrial Cybersecurity Practices has completed over 500 aeCyberPHAs along many  client interactions on various cybersecurity aspects spanning  design, assess, engineer,       test, commission, operate and maintain to produce a list of Security       Practices that covers 80 % of the challenge's clients face.

How do we use the Top 20 Security Practices

  • The Top 20 Security Practices are to be used as key guidewords for cybersecurity program development and alignment and as a prerequisite to role based general ICS cybersecurity training and awareness.

This webinar will illustrate how the Top 20 Practice Areas of industrial cybersecurity can be leveraged as tips and tricks to  practical actions for Design, Deploy and Operate & Maintain perspective.

Registration is Closed

Share This Event

Register for the Event: