Attacks on operational technology (OT) — the systems controlling industrial equipment, processes, and events — have leaped from Hollywood screens into reality. What once seemed like special-effects fiction in disaster movies about nuclear meltdowns, power grid collapses, and poisoned water systems is now a genuine threat. OT and manufacturing attacks are not new, but their impact on modern life is more significant than ever.
talk-data.com
Topic
ot security
5
tagged
Activity Trend
Top Events
In the increasingly vulnerable cybersecurity landscape, the manufacturing sector stands as a key target for security incidents. Upholding NIS2 compliance is not just a necessity— it's a strategic advantage. This talk offers exclusive insights into driving NIS2 compliance in a multi-national manufacturing environment where organizations must manage facilities in multiple EU Member States. You will learn tailored collaboration strategies with site personnel for comprehensive risk ownership and effective incident detection and response. We will delve into 'quick wins' for immediate security boosts and outline a strategic long-term roadmap. This session aims to equip attendees with the tools needed to bolster OT security and transform what we see as the common pain points into areas of strength.
Proactive Vulnerability Management in OT requires a deep dive into the complexities of Operational Technology. Effective management hinges on precise asset identification and a thorough understanding of unique enterprise risks. This approach leads to targeted vulnerability monitoring and patch management, essential in navigating the dynamic landscape of OT security. Emphasize on proactive strategies for vulnerability classification and implementation of robust remediation plans, ensuring a resilient cybersecurity posture in the midst of ever-evolving threats.
Overview of secure PLC coding practices to improve the security posture of Industrial Control Systems (ICS) by leveraging native PLC/DCS/SCADA features. Includes guidelines for engineers creating software (ladder logic, functional charts) and highlights the broader benefits for reliability, debugging, and maintenance.
Overview of secure PLC coding practices inspired by Secure Coding Practices for IT, providing guidelines for engineers creating ladder logic and functional charts to improve the security posture of ICS/OT by leveraging native PLC/DCS/SCADA capabilities. Emphasizes that more than security expertise, familiarity with PLCs, their logic, and the underlying process is essential.