John Livingston

  /    /  About John Livingston
About The Author
1.52k

Operational Technology (OT) has become a heightened target for cybersecurity attacks. The need to address OT (operational technology) cyber risks has never been greater. New threats are emerging every day – both targeted as well as untargeted collateral damage risks.

1.53k

Industrial cyber security leaders – including the C-suite, CISOs, security teams, and operational leaders – are increasingly realizing the potential financial, operational and safety impact of cyber events. Attempting to get their hands around securing this challenging part of their

2.89k

Vulnerability Management in OT or ICS cyber security is a challenge, but with an actionable strategy and existing IT/ OT cyber security tools, we can make a significant difference. What is OT/ICS vulnerability management? Vulnerability management in OT/ICS security is the process