End user companies and asset owners have taken a variety of approaches to address the need to coordinate and integrate IT, OT, and IIoT cybersecurity programs and activities, including the use of security operations centers (SOCs). A successful response must cover the full spectrum of people, process, and technology challenges that these organizations face in this area.
Speakers will describe their experiences and lessons learned. This will be followed by a discussion between panelists and workshop attendees who will add their insights on the subject and share their challenges.
Attendees will gain insight into what peer organizations are, or are not, doing and what have been determined to be effective practices.