How Are You Monitoring SCADA?


Posted on in Presentations

With the heightened concern about cyberattacks on critical infrastructure, many have concluded that we have little visibility into industrial control systems to detect malicious or inappropriate activity. This session will draw on the experience of participants to understand what ICS detection technologies they’re exploring, what works, and what technologies and techniques need more improvement.

Learning Objectives:
1: Understand where in an OT environment to monitor to detect threats.
2: Explore a process to implement a holistic monitoring program for OT.
3: Learn the various monitoring techniques for proprietary OT devices.
Participants
Gib Sorebo

Participant

Security Associate Director, Accenture

Analytics Intelligence & Response

SIEM security operations threat visualization operational technology (OT Security) critical infrastructure


Topic

Subtopic


Share With Your Community