Justin Kosar, Cybersecurity Supervisor of AEC discusses cybersecurity maturity

  • What needs to be done?
  • How do we prioritize projects?
  • How do we measure and quantify cybersecurity success?
  • How do we present projects to leadership for approval?

Download the video for a fresh perspective on gaining cybersecurity maturity for industrial organizations.

Related resources


Weathering the Deluge of OT Vulnerabilities: A Pragmatic Approach

When infosec media fixates on certain vulnerabilities, it feels like the world is one hack away from absolute chaos. But is it really?

Learn More

TSA Issues Part II of Pipeline Cyber Security Directives

Vulnerability Management in OT/ICS cyber security is a challenge, but with the right strategy and tools, we can make a difference.

Learn More
Blog, Guide

The Ultimate Guide to Understanding OT Security

What is OT security, how does it work, and where should you start when building a robust cyber security program?

Learn More

Subscribe to stay in the loop

Subscribe now to receive the latest OT cyber security expertise, trends and best practices to protect your industrial systems.