The ICS Security considerations checklist

  /  ICS Security   /  Cybersecurity   /  The ICS Security considerations checklist
cybersecurity

The ICS Security considerations checklist

As you evaluate ICS cyber security solutions to protect your critical infrastructure from threats, there are a few criteria your team must consider throughout the process.

New Checklist.png

We’ve compiled a checklist to help you select a solution that will enable both your ICS engineers and security personnel to secure and control your critical networks.

The technology you choose should be able to map all of the controllers on the network, document their configuration, log all activities and changes, and provide in-depth visibility into their state.

Download the checklist to explore the 6 areas of criteria to review before choosing an ICS cyber security solution for your organization: 

    • Automated Asset Discovery and Management
    • Incident Detection and Response
    • Continuous Network Activity Monitoring
    • Controller Integrity Validation
    • Vulnerability Assessment and Risk Management
    • Architecture and Enterprise Readiness

 

dana tamirDana Tamir brings to her role at Indegy over 15 years of real-world expertise in the cyber security industry. She joins Indegy from Trusteer (acquired by IBM in 2013) where she led product marketing for the advanced malware protection solution as Director of Enterprise Security.