Webinar: Why Hasn't SOAR Taken Off in OT?

Watch Webinar Recording

Besides the typical reluctance to embrace new technology in the ICS world, security orchestration, automation and response (SOAR) tools haven’t been as widely adopted as they probably should be because of the contextual OT data deficiency found in most security alerts. To create an appropriate automated response, you need to know exactly which devices are compromised and whether you can/should isolate them, which up until recently has been extremely difficult to do for industrial control systems.

Let’s say you’re alerted that an HMI has a banking Trojan. That’s not great, but not likely something you’d feel compelled to take offline. However, if there was ransomware in an HMI, you have a serious problem. So, what should you do? Well, if you have 7 HMIs, it’s likely fine to just disconnect the infected one to stop the spread, but if that’s your only one, then it’s definitely not ok. This is a prime example of why having access to contextual data about both the threat AND the affected asset is so critical to informing automated OT security management.

In this seminar hosted by CS2AI, you’ll learn:

  • Why security orchestration and automation reduce the risk of operational downtime from a cyberattack
  • What type of contextual security information is critical to powering a next-gen program
  • How feeding the right ICS asset data into your SIEM + SOAR helps demonstrate ROI across your security ecosystem