This page is fully or partially automatically translated.

Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

action image header it logic
Forums it-sa Expo Knowledge Forum A

Industrial cybersecurity - serious attacks worldwide with dramatic consequences. How to protect your industrial plants

Industrial CyberSecurity – serious attacks worldwide with dramatic consequences. How to protect your industrial plants?

calendar_today Tue, 22.10.2024, 16:15 - 16:30

event_available On site

place Forum, Booth 6-215

Action description

south_east

Speaker

south_east

Themes

Endpoint Protection Legislation, standards, regulations Governance, Riskmanagement and Compliance Industry 4.0 / IoT / Edge Computing Network Security / Patch Management

Key Facts

  • Industrial plants are the focus of cyber criminals
  • Access routes and risk factors are similar
  • Companies need a dedicated OT protection solution

Organizer

Event

This action is part of the event Forums it-sa Expo

Action description

Industrial companies are attractive targets for cyber criminals of all kinds. The risks of a cyber attack in an industrial environment are high. In addition to financial losses in the millions, there is a risk of injury or even death for those affected. Find out more about spectacular incidents from various industries - such as the attack with the Triton malware programme on a Saudi Arabian petrochemical plant. Practical examples clearly show how cyber criminals typically proceed, what vulnerabilities there are - and how companies can protect themselves. 
... read more

Downloads

Language: German

Questions and Answers: No

Speaker

show more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.