This episode examines how a user checking personal email on an application host in a commercial building could compromise the building’s HVAC, central plant equipment and controllers. It discusses how downstream devices are at risk and how attackers with knowledge of building control systems may exploit interoperability. The talk walks through the events in order and the remediation steps, and what actions may have inflamed attackers rather than stopped them.
talk-data.com
Topic
industrial control systems
1
tagged
Activity Trend
1
peak/qtr
2020-Q1
2026-Q1
Top Events
(CS)²AI Online™: Understanding ICS-OT Cyber Security Risks & Defense Measures
1
(CS)²AI - Putting Asset Owners in the Driver's Seat: Making the Right Decisions
1
(CS)²AI Online™ Replay: Anatomy of an Attack - From Encryption to Destruction
1
(CS)²AI - Putting Asset Owners in the Driver's Seat: Making the Right Decisions
1
(CS)²AI Online™ Replay:A New ICS Cyber Security Workforce Development Initiative
1
Top Speakers
Filtering by:
Fred Gordy
×