How Are You Monitoring SCADA?

Posted on in Presentations

With the heightened concern about cyberattacks on critical infrastructure, many have concluded that we have little visibility into industrial control systems to detect malicious or inappropriate activity. This session will draw on the experience of participants to understand what ICS detection technologies they’re exploring, what works, and what technologies and techniques need more improvement.

Learning Objectives:
1: Understand where in an OT environment to monitor to detect threats.
2: Explore a process to implement a holistic monitoring program for OT.
3: Learn the various monitoring techniques for proprietary OT devices.
Gib Sorebo


Security Associate Director, Accenture

Share With Your Community