1. Peony 4411

Industrial (ICS/OT/SCADA) cyberattacks that are made public get a wide variety of attention. But what happens behind the scenes before and after these attacks? The teams that orchestrate the attacks are still active, learning, developing and targeting other organisations. This presentation will go into those teams and what the audience should know about them to secure their infrastructure.

Learning Objectives:
1: Learn about the threat of industrial cyberthreat teams active in the world.
2: Engage in a nuanced discussion around risk with elements to consider for a successful security plan.
3: Gain understanding of best practices for ICS security through detailed discussion on what threats do.

Download pdf
Participants: