Failures in the IoT/ICS CIA model can have dire effects on privacy and personal safety. Security architectures need to blend information technology (IT) and operational technology (OT) goals. We will show a way to create a defensible architecture to mitigate the three main hacker goals: steal data, destroy data, and use your systems to attack others.
Outcomes: Understand the differences between IT and OT security requirements * Learn how to create a defensible security architecture for these 2 distinct environments