n the past, Industrial Control Systems (ICS) were separate from other business technologies, operating as on-premise systems. However, as ICS becomes more dependent on IT infrastructures and devices for command and control functions, new unforeseen risks are being discovered.
Industrial cyber security experts from Tripwire, FireEye and Tofino/Belden examine the six key weaknesses attackers use to compromise critical infrastructure and industrial controls operation. You will get real-life threat breakdowns and mitigation options available to proactive security teams.
Key Takeaways:
· Learn how to protect legacy ICS systems not designed with security in mind
· Understand the risks associated with an interconnected OT environment
· Discover available remediation options to your system's vulnerabilities