INDUSTRIAL CYBERSECURITY: Monitoring & Anomaly Detection

To build an effective ICS cybersecurity strategy, it is crucial to identify the security events that are most likely to occur. This will let you focus on implementing the appropriate measures to protect the assets that are most likely to be targeted and improve the security of sensitive assets that an attacker could use to penetrate your ICS.

Resource Details

Cisco logo
Provided by:
Cisco
Topic:
Security
Format:
PDF