
Industrial Cybersecurity
Anand Shinde
In today’s hyper-connected world, critical infrastructure — from power grids to manufacturing plants — forms the foundation of modern life. But with this connectivity comes vulnerability. Industrial Cybersecurity: A Practical Approach to OT Protection...
Location:
United States
Description:
In today’s hyper-connected world, critical infrastructure — from power grids to manufacturing plants — forms the foundation of modern life. But with this connectivity comes vulnerability. Industrial Cybersecurity: A Practical Approach to OT Protection is your essential guide to defending Operational Technology (OT) systems against evolving cyber threats. This audiobook is crafted for cybersecurity professionals, industrial engineers, IT managers, and students who want a hands-on, real-world approach to OT security. Whether you’re transitioning into OT domains or managing cyber-physical systems, this book equips you with the frameworks, tools, and strategies needed to protect your infrastructure. What You’ll Learn Unlike theoretical texts, this audiobook is packed with field-tested frameworks and actionable insights: Understand OT & IT Convergence:Master the Purdue Model:Implement NIST SP 800-82 Guidelines:Build a Cybersecurity Program:Conduct Risk Assessments:Apply Real-World Controls: Duration - 6h 58m. Author - Anand Shinde. Narrator - Anand Shinde. Published Date - Friday, 03 January 2025. Copyright - © 2024 Anand Shinde ©.
Language:
English
Opening Credits
Duration:00:02:03
Introduction and about the author sections
Duration:00:04:41
Chapter 1 operational technology systems 1 1 introduction importance of industries in modern life
Duration:00:02:03
1 2 ot overview
Duration:00:04:02
1 3 evolution of operational technology (ot)
Duration:00:08:26
1 4 it and ot convergence
Duration:00:04:39
1 5 cybersecurity attacks on ot networks
Duration:00:03:25
1 6 it iot and ot
Duration:00:14:29
1 7 the difference between it and ot
Duration:00:02:40
1 8 components of operational technology
Duration:00:08:24
1 9 difference between it and ot security
Duration:00:02:37
1 10 current issues with ot ics security
Duration:00:06:18
Chapter 2 purdue model 2 1 introduction purdue model
Duration:00:03:44
2 2 level 0 field devices and processes
Duration:00:02:59
2 3 level 1 process control
Duration:00:02:43
2 4 level 2 supervisory control
Duration:00:02:54
2 5 level 3 site supervisory control
Duration:00:03:01
2 6 level 4 enterprise business planning
Duration:00:02:00
2 7 level 5 dmz layer
Duration:00:02:12
Chapter 3 ot security as per nist sp 800 82 rev 3 3 1 introduction nist sp 800 82 rev 3 guidelines, a framework for ot security
Duration:00:06:47
3 2 scada systems
Duration:00:04:33
3 3 distributed control systems (dcs)
Duration:00:03:42
3 4 programmable logic controller based topologies
Duration:00:03:13
3 5 building automation systems
Duration:00:03:25
3 6 physical access control systems
Duration:00:03:42
3 7 safety systems
Duration:00:04:38
3 8 industrial internet of things
Duration:00:04:00
Chapter 4 operational technology cybersecurity program 4 1 introduction ot cybersecurity program
Duration:00:01:19
4 2 ot cybersecurity program development
Duration:00:04:18
4 3 establish charter for ot cybersecurity program
Duration:00:03:43
4 4 benefits of the ot cybersecurity program
Duration:00:03:59
4 5 ot cybersecurity program content
Duration:00:03:47
4 6 cybersecurity program implementation team
Duration:00:04:40
4 7 ot cybersecurity strategy
Duration:00:04:22
Chapter 5 risk management for ot systems 5 1 introduction risk management for ot systems
Duration:00:01:03
5 2 managing ot security risk
Duration:00:04:07
5 3 framing ot risk
Duration:00:03:51
5 4 assessing risk
Duration:00:04:33
5 5 responding to risk
Duration:00:03:52
5 6 monitoring risk
Duration:00:04:10
5 7 applying risk management framework
Duration:00:04:30
Chaper 6 risk management framework steps 6 1 introduction risk management framework
Duration:00:01:00
6 2 prepare
Duration:00:04:10
6 3 p 1 risk management roles
Duration:00:03:43
6 4 p 2 risk management strategy
Duration:00:02:48
6 5 p 3 risk assessment – organization
Duration:00:02:39
6 6 p 4 tailored control baseline and cybersecurity framework
Duration:00:03:28
6 7 p 5 common control identification
Duration:00:03:13
6 8 p 6 impact level prioritization
Duration:00:03:05
6 9 continuous monitoring strategy – organization
Duration:00:03:26
6 10 p 8 mission or business focus
Duration:00:03:39
6 11 p 9 system stakeholders
Duration:00:03:10
6 12 p 10 asset identification
Duration:00:03:27
6 13 p 11 authorization boundary
Duration:00:03:31
6 15 p 13 information life cycle
Duration:00:03:37
6 16 p 14 risk assessment system
Duration:00:03:24
6 17 p 15 requirements definition
Duration:00:03:30
6 18 p 16 enterprise architecture
Duration:00:03:25
6 19 p 17 requirements allocation
Duration:00:03:28
6 20 p 18 system registration
Duration:00:03:52
6 21 categorize
Duration:00:03:14
6 22 task c 1 system description
Duration:00:03:16
6 23 task c 2 security categorization
Duration:00:03:19
6 24 task c 3 security categorization review and approval
Duration:00:03:08
6 25 select
Duration:00:03:08
6 26 task s 1 control selection
Duration:00:02:53
6 27 task s 2 control tailoring
Duration:00:02:32
6 28 task s 3 control allocation
Duration:00:02:37
6 29 task s 4 documentation of planned control
Duration:00:02:52
6 30 task s 5 continuous monitoring strategy – system
Duration:00:03:00
6 31 implement
Duration:00:03:13
6 32 task i 1 control implementation
Duration:00:03:13
6 33 task i 2 update control implementation information
Duration:00:03:10
6 34 assess
Duration:00:02:46
6 35 task a 1 assessor selection
Duration:00:03:06
6 36 task a 2 assessment plan
Duration:00:02:50
6 37 task a 3 control assessment
Duration:00:02:48
6 38 task a 4 assessment reports
Duration:00:03:06
6 39 task a 5 remediation actions
Duration:00:02:38
6 40 task a 6 plan of action and milestones
Duration:00:02:18
6 41 authorize
Duration:00:02:12
6 42 task r 1 authorization package
Duration:00:02:31
6 43 task r 2 risk analysis and determination
Duration:00:02:32
6 44 task r 3 risk response
Duration:00:03:20
6 45 task r 4 authorization decision
Duration:00:02:26
6 46 task r 5 authorization reporting
Duration:00:02:41
6 47 monitor
Duration:00:02:49
6 48 task m 1 checking system and environment changes
Duration:00:03:04
6 49 task m 2 ongoing assessment
Duration:00:02:34
6 50 task m 3 ongoing risk response
Duration:00:03:15
6 51 task m 4 authorization package updates
Duration:00:03:11
6 52 task m 5 security and privacy reporting
Duration:00:03:28
6 53 task m 6 ongoing authorisation
Duration:00:03:01
6 54 task m 7 system disposal
Duration:00:03:12
Chapter 7 ot cyber security architecture 7 1 introduction ot cybersecurity architecture
Duration:00:01:19
7 2 defense in depth architecture
Duration:00:02:55
7 3 layer 1 security management
Duration:00:02:51
7 4 layer 2 physical security
Duration:00:02:51
7 5 layer 3 network security
Duration:00:02:58
7 6 network architecture
Duration:00:04:37
7 7 centralized logging
Duration:00:03:50
7 8 network monitoring
Duration:00:03:44
7 9 zero trust architecture
Duration:00:03:19
7 10 layer 4 hardware security
Duration:00:03:20
7 11 layer 5 software security
Duration:00:03:09
7 12 additional consideration
Duration:00:03:40
7 13 distributed control system (dcs) based ot system
Duration:00:03:42
7 15 scada based ot environments
Duration:00:03:42
Chapter 8 ot security capabilities and tools 8 1 introduction ot security tools and capabilities
Duration:00:01:14
8 2 segmentation firewall
Duration:00:04:54
8 3 segmentation unidirectional gateway
Duration:00:04:12
8 4 segmentation virtual local area networks
Duration:00:04:03
8 5 segmentation software defined networking
Duration:00:03:49
8 6 networking monitoring security information and event management behavior anomaly detection data loss
Duration:00:06:21
8 7 networking monitoring siem deception & digital twin
Duration:00:03:33
8 8 data security immutable storage hashing
Duration:00:04:17
8 9 data security digital signatures remote access
Duration:00:04:22
Conclusion
Duration:00:02:13
Ending Credits
Duration:00:01:34