Defeating Insider Threats to Critical Infrastructure

Posted on in Presentations

How do industrial operators prevent insider attacks against critical infrastructure? Many industrial systems were never intended to be connected to shared networks and are air-gapped or separated. However, this approach has been discontinued as more systems need connectivity. Learn how vendors can build proactive IACS solutions to reduce risk and enable operators to secure physical plants.

Learning Objectives:
1: Gain an understanding of existing processes used to manage porous IACS environments.
2: Understand the scale of the issue and why it exists.
3: Develop a working knowledge of how IoE / cloud can solve these problems

Christopher Blask

Global Director - Industrial Control System Security, Unisys

Eric Knapp

Chief Engineer, Director of Innovation, Honeywell

Hackers & Threats

operational technology (OT Security) security architecture standards critical infrastructure



Share With Your Community