Hacking-ICS-280

Hacking Industrial Control Systems — Chapters 1 & 2

Your Hands-On Guide to ICS Risk Management.
Download your complimentary copy of “Introduction to ICS [In]Security“

Download the report

By exploring cybersecurity from an attacker’s perspective, this guide to ICS and SCADA cybersecurity “Hacking Exposed: Industrial Control Systems” follows in the same spirit as the wildly-popular Hacking ExposedTM series and has become the industry bible on ICS/SCADA/OT security.

To help you get up to speed on ICS and SCADA risk management, we are giving away these complementary educational chapters from Hacking Exposed: Industrial Control Systems. Download them to learn

  • How IT and Operational Technology (OT) cybersecurity are different
  • Understanding realistic ICS/SCADA/OT cyber threats and common terminology used in operational technology environments (PLC, HMI, etc.)
  • Introduction to standard ICS/SCADA/OT risk assessment frameworks: how to define business objectives, cyberthreat targets, impacts and risk scores
  • How to identify assets, OT network topology, data flows, and ICS/ SCADA vulnerabilities without impacting production systems.

Hacking Exposed Industrial Control Systems: ICS and SCADA Secrets & Solutions. View author bios and purchase entire book here.