Why is SCADA Security an Uphill Battle?

  • Friday, March 1, 2013 | 11:40 AM – 12:00 PM | Room: Room 304

View all Sessions

This session combines original research on technical SCADA security challenges faced by organizations with some of the recently discovered SCADA vulnerabilities, and tries to decipher the SCADA crypt. It will identify avenues of attack and explain how critical infrastructures can be compromised. It will also provide mitigation strategies and security controls to secure against exploitation.


This document was retrieved from on Fri, 09 Oct 2015 01:06:28 -0400.
© 2015 EMC Corporation. All rights reserved.