What is OT Security | Introduction to OT Cybersecurity | Knowledge and Skills needed for OT Security

Поделиться
HTML-код
  • Опубликовано: 29 май 2022
  • This Session gives you an idea about OT Security and How is it different from IT . It also gives you an idea about the needs and challenges of Industrial control systems .It also guides you about knowledge , skills and certifications required in order to excel in OT Cybersecurity . For those who are not aware, OT is short for Operational Technology. Operational technology (OT) is the use of hardware and software to monitor and control physical processes, devices, and infrastructure. Operational technology systems are found across a large range of asset-intensive sectors, performing a wide variety of tasks ranging from monitoring critical infrastructure (CI) to controlling robots on a manufacturing floor.
    Speakers Profile
    ==============
    Mubarik Mustafa is an OT/ICS Cybersecurity consultant with ACET Solutions. He has over 25 years of experience in Industrial Control Systems engineering and OT Cybersecurity.
    LinkedIn:
    / muhammad-mubarik-musta...
    About GISPP
    ===========
    It is an effort by GISPP (Global Information Security Society for Professionals of Pakistan) .GISPP was initiated in 2016 by a group of Pakistani Information Security professionals living and working in Saudi Arabia. You can follow us on our social media links mentioned on our Channel Page .
    #OTSecurity #ICS #OTCyberSecurity #careerpath #scada #OTcareerpath #OTCyber #GISPP #GisppAcademy #GisppTraining #Cybersecurity #Informationsecurity

Комментарии • 15

  • @jagszubair1256
    @jagszubair1256 Год назад +2

    very nice explaination .. awasome ..its fully clear obout technolgy

  • @manahmed9262
    @manahmed9262 5 месяцев назад

    that is very good explain جزاك الله خير

  • @philosphize
    @philosphize 4 месяца назад

    Amazed by explanation

  • @adewalebello2280
    @adewalebello2280 3 месяца назад

    This is very interesting.

  • @aasish.san1188
    @aasish.san1188 Год назад

    Great session on OT cybersecurity.

  • @anandsinghdhouni
    @anandsinghdhouni Год назад

    Thanks for sharing Sir... Great explaination...

  • @brianwalker6170
    @brianwalker6170 Год назад +1

    Thank you so much for the help. Extremely helpful! You saved me multiple long painful headaches

  • @iqrakhalil5027
    @iqrakhalil5027 Год назад

    Something new

  • @charlesoparah3178
    @charlesoparah3178 3 месяца назад

    Mashallah,
    Wow, MONSTER presentation. Oh my goodness. Can you please recoomend a book. Thank you.

    • @GISPPACADEMY
      @GISPPACADEMY  Месяц назад

      This link might be helpful.
      www.linkedin.com/feed/update/urn:li:activity:7187175922964340736?

  • @ratnesh12100
    @ratnesh12100 2 года назад +1

    Nicely explained.. request you to please cover the industrial protocol vulnerablbility..

    • @GISPPACADEMY
      @GISPPACADEMY  2 года назад +1

      We have jotted down your request..

  • @manikandanp.s4574
    @manikandanp.s4574 Год назад

    Any tool available to take remote of OT devices like we use in IT devices

  • @manikandanp.s4574
    @manikandanp.s4574 Год назад

    Could you please share us the Deck , it’s very informative

    • @GISPPACADEMY
      @GISPPACADEMY  Год назад

      We will check with the presenter about it.