This episode examines how a user checking personal email on an application host in a commercial building could compromise the building’s HVAC, central plant equipment and controllers. It discusses how downstream devices are at risk and how attackers with knowledge of building control systems may exploit interoperability. The talk walks through the events in order and the remediation steps, and what actions may have inflamed attackers rather than stopped them.
talk-data.com
Topic
cybersecurity
1
tagged
Activity Trend
7
peak/qtr
2020-Q1
2026-Q1
Top Events
Exploring the Powerful Intersection of AI and Cybersecurity
4
(CS)²AI Online™: Proactive OT Discovery and Remediation to Reduce Business Risk
2
(CS)²AI Online™: Understanding ICS-OT Cyber Security Risks & Defense Measures
1
London Analytics Engineering Meetup #19
1
AI in Cybersecurity: Defending Against Tomorrow’s Threats Today
1
What is new with CompTIA Security+ SY0-701?
1
Meet the Unbiased AI Reshaping Cybersecurity and Beyond
1
(CS)²AI Online™ Seminar - Geopolitical Issues of GPS/AIS Spoofing and Jamming
1
IBM TechXchange Conference 2023 Live Stream - Keynote Quantum
1
#SecurityGirls LATAM - Inteligencia de amenazas: recopilación y análisis de dato
1
(CS)²AI Online™ Replay:A New ICS Cyber Security Workforce Development Initiative
1
(CS)²AI Online™ Replay: Anatomy of an Attack - From Encryption to Destruction
1
Filtering by:
(CS)²AI Online™ Replay: Anatomy of an Attack - From Encryption to Destruction
×