Try our new research platform with insights from 80,000+ expert users

Badges

40 Points
3 Years

User Activity

Over 3 years ago
While in the IT operation we protect Money, data and privacy, for the ICS operation we must protect operation Safety.  Safety is the top-level requirement for every cyber-physical operation
Over 3 years ago
Being able to perform accurate asset inventory also for legacy type installations which often use serial protocols in the ICS network
Over 3 years ago
Conduct a process for asset inventory and monitor vendors' publication on vulnerabilities.