Uptake’s security researchers will walk the general public through the differences between IT and OT, and a selection of top SCADA protocols. The presentation will culminate an in a live attack simulation against a programmable logic controller, complete with play-by-play explanation.
1: Get an introduction to SCADA.
2: Learn about SCADA protocols.
3: Watch a demonstration of a live PLC attack.
Hackers & Threats
cyber warfare & cyber weapons hackers & threats operational technology (OT Security) security awareness critical infrastructure
Share With Your Community