X

Ultra Electronics 3eTi

On-Demand Webinar: Cybersecurity Tips for OT Networks

November 20th, 2017 / By

Learn how to prevent cyber-attacks that preserve and protect operations using high-efficiency approaches to securely implement true end-to-end embedded security. These strategies work with current operational systems and secure all devices connected to a network without sacrificing productivity and safety standards.

Key Takeaways
  • Review standards for security laid out in IEC 62443/ISO 27001
  • Consider commonly overlooked critical vulnerabilities
  • Study methods for aligning the threat landscape to today’s hacker trends, techniques and technologies
  • Evaluate strengths and shortcomings of multilayer and multivendor security
  • Discuss ICS attacks and threat mitigation using new end-to-end embedded security strategies
  • Examine costs associated with PLC-focused attacks

View recording >