As OT Cybersecurity practitioners avoiding cyber attacks is our primary goal, however they happen – unfortunately at an ever-increasing rate! If we accept that we cannot with 100% certainty prevent cyber compromises, then we need to be able to effectively and expediently respond to and recover from them. Most organizations have an IT response plan in place - the OT environment is significantly different from the IT environment and requires a response plan specifically tailored to the OT environment. This presentation will discuss the implementation of an OT specific cyber compromise response plan based on ISA’s ICS4ICS response program.
ISA Connect Terms of Use | Help/FAQs
PO Box 12277
Research Triangle Park, NC 27709
Email: info@isa.org
Phone: +1 919-549-8411
© 2026 International Society of Automation, its licensors, and contributors. All rights are reserved, including those for text and data mining, AI training, and similar technologies.