Download pdf
Operational technology devices connected to the Internet can be used as a pivot for network ingress, or directly attacked to cause kinetic effect. The presenters deployed 12 ‘Conpot’ honeypots and collected data for 30 days, recording 40,163 interactions, with 93% of traffic initiated by cybersecurity providers, which raises a number of issues. This talk will discuss the significant implications for this activity.

Learning Objectives:
1: Understand the most commonly targeted control system protocols.
2: Find out the types of attackers targeting your network.
3: Learn how a honeypot can help to protect your systems.
Presenters