Why is SCADA Security an Uphill Battle?

  • Friday, March 1, 2013 | 11:40 AM – 12:00 PM | Room: Room 304

View all Sessions

This session combines original research on technical SCADA security challenges faced by organizations with some of the recently discovered SCADA vulnerabilities, and tries to decipher the SCADA crypt. It will identify avenues of attack and explain how critical infrastructures can be compromised. It will also provide mitigation strategies and security controls to secure against exploitation.


This document was retrieved from on Fri, 27 Mar 2015 04:12:02 -0400.
© 2015 EMC Corporation. All rights reserved.