Posted on
in Presentations
Uptake’s security researchers will walk the general public through the differences between IT and OT, and a selection of top SCADA protocols. The presentation will culminate an in a live attack simulation against a programmable logic controller, complete with play-by-play explanation.
Learning Objectives:
1: Get an introduction to SCADA.
2: Learn about SCADA protocols.
3: Watch a demonstration of a live PLC attack.
Learning Objectives:
1: Get an introduction to SCADA.
2: Learn about SCADA protocols.
3: Watch a demonstration of a live PLC attack.
Hackers & Threats
cyber warfare & cyber weapons hackers & threats operational technology (OT Security) security awareness critical infrastructure
Topic
Hackers & Threats
Subtopic
cyber warfare & cyber weapons
hackers & threats
operational technology (OT Security)
security awareness
critical infrastructure
Share With Your Community