Cyber Security Strategies: Protecting Your ICS Investments a discussion with Ultra-3eti and Mike Assante of SANS

  • Webcast Aired Thursday, 23 Jul 2015 1:00PM EST (23 Jul 2015 17:00 UTC)
  • Speakers: Michael Assante, Alex Tarter

The threat landscape is changing with new vulnerabilities emerging to exploit them. The costs to industry are almost immeasurable in terms of dollars spent and lost; new cyber security strategies are badly needed. Realistic options exist.

Learn how to prevent cyber-attacks that preserve and protect operations using high-efficiency approaches that implement true end-to-end embedded security. These strategies work with current operational systems and secure all devices connected to a network without sacrificing productivity and safety standards.

During this webinar you will:

  • Consider commonly overlooked critical vulnerabilities
  • Review security standards laid out in IEC 62443/ISO 27001
  • Study methods for aligning the threat landscape to today's hacker trends, techniques and technologies
  • Evaluate strengths and shortcomings of multilayer and multivendor security
  • Discuss ICS attacks and threat mitigation using new end-to-end embedded security strategies
  • Examine costs associated with PLC-focused attacks

Who Should Attend:

Managerial, technical, facilities, industrial maintenance, and other senior-level specialists interested in automated military or industrial network protection, but who are limited by security requirements, cost restrictions or legacy integrations.