|Closed captioning will be available in English and Japanese for all keynotes and RSAC track sessions.
Please note: All times are in SGT.
Operational technology devices connected to the Internet can be used as a pivot for network ingress, or directly attacked to cause kinetic effect. The presenters deployed 12 ‘Conpot’ honeypots and collected data for 30 days, recording 40,163 interactions, with 93% of traffic initiated by cybersecurity providers, which raises a number of issues. This talk will discuss the significant implications for this activity.
1: Understand the most commonly targeted control system protocols.
2: Find out the types of attackers targeting your network.
3: Learn how a honeypot can help to protect your systems.