In this week’s Whiteboard Wednesday, Scott King, Senior Advisor of Security Advisory Services at Rapid7 and Brian Proctor, Director of Strategic Accounts at SecurityMatters, team up to discuss how vulnerability management in ICS is different from that in corporate IT environments. Learn what four approaches you can take to monitor the vulnerabilities in your industrial control systems and discover how your systems work, operate, and communicate with each other for a more effective approach to control system monitoring.
Comments
Post a Comment