Skip to main content
Whitepaper

Design and Build Productive and Secure Industrial Systems (Paper 2 of 3)

By Kenneth G. Crowther (General Electric), Robert M. Lee (Dragos), K. Reid Wightman (Dragos)

Part 2 of an ongoing collaboration between General Electric and Dragos.

Methods for conceptualizing and leveraging knowledge of the threats against ICS to position your business to appropriately prioritize security innovations.

When considering threats to Industrial Control Systems (ICS), it is important to note that the “threat” is the human adversary. It is a mistake to simply focus on studying malware or patching vulnerabilities because many attacks can be done with native features and functionality already present in industrial networks. This whitepaper, 2nd in a 3-part series, focuses on articulating how to cost-effectively understand threats against industrial systems and drives the point that security should be adapted based on connectivity requirements from the business and the threats to the processes, rather than published vulnerabilities and exposures.

Enter your information to download the whitepaper.
SKIP
Discover More Resources Using Keyword Tags
General Electric Reid Wightman Robert M. Lee

Discover more resources.

Explore more resources to support you on your ICS cybersecurity journey.

Read our next whitepaper

whitepapers

Dragos takes intelligence-driven approach

Dragos, Inc.
View Whitepaper
Right Arrow

View more whitepapers

Right Arrow

See the Dragos Platform in Action

Take the next step to protect your OT environment now with a free demo