top of page
![](https://static.wixstatic.com/media/34c077_574821dcaa924717bdbcf531288ead78~mv2.gif/v1/fill/w_1688,h_1688,al_c,pstr/34c077_574821dcaa924717bdbcf531288ead78~mv2.gif)
Search
![](https://static.wixstatic.com/media/34c077_d55ecd52ea1e40129cb3862219009644~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/34c077_d55ecd52ea1e40129cb3862219009644~mv2.webp)
![Cover your ASSets when it comes to Cybersecurity](https://static.wixstatic.com/media/34c077_d55ecd52ea1e40129cb3862219009644~mv2.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/34c077_d55ecd52ea1e40129cb3862219009644~mv2.webp)
Stephen Goldsworth
Mar 31, 2020
Cover your ASSets when it comes to Cybersecurity
The foundation of an effective operational technology (OT) Cybersecurity strategy is documented knowledge about the specific process...
bottom of page