This talk will skip the standard pitch about why ICS networks are vulnerable and the criticality of operational continuity, and go right to the point, which is to explain how ICS cyber-attacks really operate and where are the security gaps that enable these attacks.
Industrial networks are inherently different than IT networks. In most IT cyber-attack scenarios, the same protocols are used for configuration and production operations. However, in industrial networks, different protocols are used for different types of operations. The builders of Stuxnet understood this more than 5 years ago, yet most security specialists still don’t fully understand the difference.
In this session we will discuss:
Join us for this myth-busting session in which we will dispel common fables around industrial cyber-attacks and explain how they really operate.
Session attendees will: