The typical ICS environment is no longer the impregnable air-gapped network that it once was. It has been connected to the enterprise network, to the Internet, and to business partners who provide remote support. So while the traditional Purdue reference architecture is still “the” model, in most real-world environments it has lost its integrity. Attackers can find their way into your OT environment through new connected devices and converging networks. To address this problem, enterprises need a comprehensive security approach that secures both IT and ICS environments. Join us for this presentation where we'll discuss practical approaches to achieving this goal.