Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Blue wallpaper with lock
Forums it-sa Expo Knowledge Forum E

Intrusion detection in OT: Practical experience from over 100 energy facilities

Typical, critical security problems have been identified in over 100 projects for the implementation of attack detection systems (IDS).

calendar_today Tue, 22.10.2024, 16:30 - 16:45

event_available On site

place Forum, Booth 9-103

Action Video

south_east

Action description

south_east

Themes

Network Security / Patch Management SIEM / Threat Analytics / SOC

Key Facts

  • OT systems are particularly vulnerable to cyber-attacks.#Attack detection is central to OT security.#Automated vulnerability management reduces costs.

Event

This action is part of the event Forums it-sa Expo

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

This presentation will discuss our experience in implementing intrusion detection systems in OT environments of critical infrastructures. We present critical security problems in OT networks and show possible attack vectors of power supply systems.

Critical infrastructures, such as substations, power plants or control centers, are an attractive target for cyber attacks. The increasing networking and digitalization of these systems and components increases the attack surface and makes them more susceptible to threats. An effective intrusion detection system is therefore essential to ensure the security and reliability of these infrastructures and therefore the power supply.

Due to the long lifetime of OT and ICS systems - in conjunction with their criticality - OT vulnerability management is of great importance. However, this is particularly challenging: ICS/OT components primarily serve the safety and availability of the critical systems they control, so interruptions to operation must be avoided at all costs. The service life of OT systems is designed for over 15 years. Insufficient consideration of other security objectives (confidentiality, integrity) or the inability to implement state-of-the-art IT security measures increases the risk potential.

Our practical findings from the use of IDS underline the need for action to implement the “state of the art” in cyber security in the OT sector. Automation, Cooperation and the exchange of know-how between IT and OT personnel is the key to success and a secure power supply.
... read more

Downloads

Language: German

Questions and Answers: No

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.