6 years agoA foundation for knowing your cyber vulnerabilitiesFour steps to an OT cybersecurity solution