Traditional Attack Motives must be Tailored for the ICS World
- Friday, May 31st, 2013 at 1:00 PM EDT (17:00:00 UTC)
- Pat Combs, Schneider Electric
You can now attend the webcast using your mobile device!
Today, cyber attacks are conducted for numerous reasons to include; satisfaction, extortion, profit, political motivations, theft of business data and/or Intellectual Property and business network infrastructure intelligence or scoping. This webinar will provide an understanding of how attackers must modify their attack thought process based on their motivations and its relevance to ICS systems. We will explore three separate ICS attacks, the vulnerability identified and used and the resulting exposure to the business entity. Lastly, an analysis of the damage for each attack and the comparative business loss in US dollars.