About Session
– Risk based approach to choosing monitoring points
– Collect and forward traffic
– Inter-zone visibility, IT/OT bridge, edge device discovery, outside view
– OT Network Security Monitoring and its limits
– Lab: testing and validating
– Risk based approach to choosing monitoring points
– Collect and forward traffic
– Inter-zone visibility, IT/OT bridge, edge device discovery, outside view
– OT Network Security Monitoring and its limits
– Lab: testing and validating