Badges

40 Points
2 Years

User Activity

Over 2 years ago
While in the IT operation we protect Money, data and privacy, for the ICS operation we must protect operation Safety.  Safety is the top-level requirement for every cyber-physical operation
Over 2 years ago
Being able to perform accurate asset inventory also for legacy type installations which often use serial protocols in the ICS network
Over 2 years ago
Conduct a process for asset inventory and monitor vendors' publication on vulnerabilities.