Secure operations technology

a book by Andrew ginter

IT-SEC = PROTECT THE INFORMATION
SEC-OT = PROTECT PHYSICAL OPERATIONS FROM INFORMATION, MORE SPECIFICALLY FROM ATTACKS EMBEDDED IN INFORMATION

Secure operations technology

a book by Andrew ginter

IT-SEC = PROTECT THE INFORMATION
SEC-OT = PROTECT PHYSICAL OPERATIONS FROM INFORMATION, MORE SPECIFICALLY FROM ATTACKS EMBEDDED IN INFORMATION

WATCH THE SEC-OT BOOK PRESENTATION at S4x19

When the consequences of compromise are unacceptable – unscheduled downtime, impaired product quality and damaged equipment – IT-SEC defences are not enough. Secure Operations Technology (SEC-OT) is a perspective, a methodology, and a set of best practices pioneered at secure industrial sites:

  • SEC-OT demands cyber-physical protection for control-critical networks – because all software can be compromised.

  • SEC-OT strictly controls the flow of information into control-critical networks from noncritical networks – because all information can encode attacks.

  • SEC-OT uses a wide range of attack capabilities to determine the strength of security postures – because nothing is secure.

Secure Operations Technology documents the SEC-OT perspective, methodology and best practices, including protection against both offline and online cyber attacks, as well as a set of twenty standard cyberattack patterns to use when evaluating the security of industrial sites.

Secure Operations Technology is available free of charge for a limited time to qualified practitioners. To request your free copy, please enter your contact and shipping information at right.

When the consequences of compromise are unacceptable – unscheduled downtime, impaired product quality and damaged equipment – IT-SEC defences are not enough. Secure Operations Technology (SEC-OT) is a perspective, a methodology, and a set of best practices pioneered at secure industrial sites:

  • SEC-OT demands cyber-physical protection for control-critical networks – because all software can be compromised.

  • SEC-OT strictly controls the flow of information into control-critical networks from noncritical networks – because all information can encode attacks.

  • SEC-OT uses a wide range of attack capabilities to determine the strength of security postures – because nothing is secure.

Secure Operations Technology documents the SEC-OT perspective, methodology and best practices, including protection against both offline and online cyber attacks, as well as a set of twenty standard cyberattack patterns to use when evaluating the security of industrial sites.

Secure Operations Technology is available free of charge for a limited time to qualified practitioners. To request your free copy, please enter your contact and shipping information at right.

GET A FREE COPY, we are shipping it worldwide

IT-SEC = protect the information

SEC-OT = protect physical operations from information, more specifically from attacks embedded in information

When the consequences of compromise are unacceptable – unscheduled downtime, impaired product quality and damaged equipment – IT-SEC defences are not enough. Secure Operations Technology (SEC-OT) is a perspective, a methodology, and a set of best practices pioneered at secure industrial sites:

  • SEC-OT demands cyber-physical protection for control-critical networks – because all software can be compromised.
  • SEC-OT strictly controls the flow of information into control-critical networks from noncritical networks – because all information can encode attacks.
  • SEC-OT uses a wide range of attack capabilities to determine the strength of security postures – because nothing is secure.

Secure Operations Technology documents the SEC-OT perspective, methodology and best practices, including protection against both offline and online cyber attacks, as well as a set of twenty standard cyberattack patterns to use when evaluating the security of industrial sites.

Secure Operations Technology is available free of charge for a limited time to qualified practitioners. To request your free copy, please enter your contact and shipping information at right.

Register for free copy: