Summary
In this chapter, three case studies were presented to highlight a few foundational IIoT security concepts in a real-world context. The first case study described (based on publicly available forensic reports) the anatomy of a successful cyberattack on a nation's critical infrastructure. It analyzed the trail of activities that led to the attack of impact, and it discussed countermeasures that could have averted the attack.
The second case study presented the business drivers and technical solutions used by an industrial enterprise to develop a security program to protect its connected OT environment. The security program was grounded on several practical considerations, discussed in earlier chapters of this book.
The third case study highlighted an industrial security standard-based approach to extend robust security defenses up to the endpoints.
In Chapter 10, The Road Ahead, we will sum up our discussions by focusing on the road ahead, to build a secure and connected brave new world...