
NIST Recommendations For IoT & ICS Security
NIST’s latest report demonstrates how purpose-built IoT & ICS anomaly detection technologies can effectively reduce the risk of destructive cyberattacks.
The latest NIST report describes how IoT & ICS anomaly detection technologies like CyberX enable manufacturing organizations to effectively reduce the risk of destructive cyberattacks — such as WannaCry, NotPetya, and TRITON — without impacting OT networks.
The report, resulting from close collaboration between NIST’s National Cybersecurity Center of Excellence (NCCoE), CyberX and other technology providers such as OSIsoft, presents detailed findings and a reference architecture that organizations can use for their own environments. This comprehensive executive summary reveals:
- Why behavioral anomaly detection (BAD) is needed for detection of fileless and zero-day malware – and why traditional tools relying on predefined signatures are not effective
- Mapping the NIST Cybersecurity Framework (CSF) to BAD
- 15 OT-specific threat scenarios devised by NIST and how CyberX’s agentless platform detected them in NIST’s OT testbed environment (with screenshots)
Get all the findings and expert recommendations.