Today you’ve decided to visit an oil refinery. Can you just walk around the facility wherever you want go? Of course not. Each person only has access to the areas they need to have access to. The same is true for cyber security as well with a few twists.
Who decides where each person can go and where they can’t? How do they decide which doors have access restrictions and which ones don’t? It may not surprise you that these same decisions are also made in the digital world of communication. In this video we’re going to learn about these two worlds of security policy, the physical and the digital. We’ll discover how they are similar in the way they work and how they are quite different.
=============================
References in this Video:
=============================
Zones and Conduits Principles:
[ Ссылка ]
[ Ссылка ]
Standards to reference:
NIST Cyber Security Framework 2.0
IEC/ISA 62443
Images Used in this video:
[ Ссылка ]
[ Ссылка ]
All other image elements were AI generated by Adobe Photoshop or Midjourney.
=============================
Cisco Resources:
=============================
Cisco's industry use case sites:
Mining: cs.co/miningportfolio
Energy: cs.co/oilandgasportfolio
All Cisco Energy and Mining Blogs:
[ Ссылка ]
[ Ссылка ]
For more information on how Cisco can help with digital strategies in Energy and Mining visit:
www.cisco.com/go/oilandgas
www.cisco.com/go/mining
=============================
This Video was Filmed Using:
=============================
Camera:
Amazon ➡️ [ Ссылка ]
Teleprompter:
Amazon ➡️ [ Ссылка ]
Microphone:
Amazon ➡️ [ Ссылка ]
Lights:
Amazon ➡️ [ Ссылка ]
=============================
Our mission here at Energy and Mining Innovation is to connect people in the energy and mining industry with the partners and information they need to navigate a successful digital journey.
Ещё видео!