instructor

14
Welcome to the Course!
Before you begin...
Introduction and Course Objectives
IT, IoT, Cybersecurity, and Risk Mitigation
How IoT Is Different than IT
Vulnerabilities, Threats, and Compromised IoT Systems
Vocabulary and Case Study Review
Vendor Relationships, Supply Chains and Privacy Implications
Recommendations and Approach to Industrial IoT Risk Mitigation
Bonus Resources
Up Next: Test Your Knowledge
Enhance Your ESG Strategy: Using Cybersecurity to Protect Quiz
Next Steps
Before you go...

img

14
Welcome to the Course!
Before you begin...
Introduction and Course Objectives
IT, IoT, Cybersecurity, and Risk Mitigation
How IoT Is Different than IT
Vulnerabilities, Threats, and Compromised IoT Systems
Vocabulary and Case Study Review
Vendor Relationships, Supply Chains and Privacy Implications
Recommendations and Approach to Industrial IoT Risk Mitigation
Bonus Resources
Up Next: Test Your Knowledge
Enhance Your ESG Strategy: Using Cybersecurity to Protect Quiz
Next Steps
Before you go...