There are several software tools that can be used for conducting a cyber security audit on an operation technology (OT) network. It’s important to note that the software used for cyber security audit will depend on the specific requirements of the operation technology network and the compliance requirements of the organisation. If you would like to learn more about our capability and understand how we can help you accelerate your results, please contact us.
We appreciate your support and likes. Please subscribe and follow us for future update. If you have any specific questions, comment below. If you want to access a written copy of this video, click the link in the description.
Yu Jordan Zhao has over 18 years’ experience in the SCADA operation technology and maintenance applications across multiple sectors including renewable energy, water, wastewater, oil and gas and environmental conservation in Australia.
Yu has a wealth of knowledge in many technical areas including SCADA architecture design, hosted SCADA servers integration, RTU, PLC, radio, cellular, OT and. His goal is to drive innovation within the business to provide better services and technologies to clients.