NCyTE: Advanced Manufacturing Cyber Threats and Mitigation Strategies (2 of 2)

1 Views
Published
In this second video in the series on advanced manufacturing and cybersecurity, we discuss cyber threats and mitigation strategies. We start with a brief overview of key concepts discussed in the first video, followed by a discussion of cyber threats to operational technology (OT); Industrial Internet of Things (IIoT); cloud-based control systems; examples of cyber attacks on OT, including Stuxnet, and finally risk mitigation strategies and controls for cybersecurity in manufacturing (woven into this presentation).

The intended audiences for these videos are high school or community college students currently enrolled in IT or cybersecurity programs or courses.

NCyTE Center and this material is based upon work supported by the National Science Foundation under Grant #1902329.

Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.
Category
Management
Be the first to comment