IIoT World Days Track: ICS Security – Risks, Strategies and Solutions
· Augmented Reality

IIoT World Days Track: ICS Security – Risks, Strategies and Solutions

Track Sponsored by aDolus This track, originally presented at IIoT World Days on June 30, 2020, covers 4 presentations from industry leaders in ICS Security: Five Blind Men and the Elephant called ICS Supply Chain Security The Road to Industrial IoT Security Automated ICS Vulnerability Assessment Identifying Compromises Through Device Profiling Using Open Source Tools […]

Read more →
Rogue Automation: Vulnerable and Malicious Code in Industrial Programming
· Cybersecurity

Rogue Automation: Vulnerable and Malicious Code in Industrial Programming

In this White Paper, previously unknown design flaws that malicious actors could exploit to hide malicious functionalities in industrial programming for robots and other automated manufacturing machines are revealed. Since these flaws are difficult to fix, enterprises that deploy vulnerable machines could face serious consequences. An attacker could exploit them to become persistent within a […]

Read more →
[Infographic] 7 Most Unsafe Gaps for Industrial Cybersecurity
· Cybersecurity

[Infographic] 7 Most Unsafe Gaps for Industrial Cybersecurity

Although WannaCry and Petya did not specifically target industrial networks, they did reach them. Many IT leaders and their board of directors responded in panic. The incidents raised the profile of how malware can move to ICS environments. It opened up perspective that if bad actors wanted to launch a ransomware attack on industrial networks, they clearly could. Protect Your Entire Network – that […]

Read more →
How to invest your first dollar in Industrial Cybersecurity?
· Cybersecurity

How to invest your first dollar in Industrial Cybersecurity?

Wanacry and NotPetya achieved what the experts were struggling to do: propel cybersecurity issues on board and raise awareness. Recent cyber-attacks have already cost businesses a lot and encourage top management to invest now their first money in their ICS cybersecurity. Once companies are ready to invest, the following questions arise: what level of security […]

Read more →
Two Reasons for the ICS Cybersecurity Deficiency
· Cybersecurity

Two Reasons for the ICS Cybersecurity Deficiency

When it comes to industrial cybersecurity; governments know they need to improve it, industry knows it needs to better understand it, and system integrators/automation vendors know they need to offer it. If you fall within any of these categories, ask yourself “What’s your industrial cybersecurity strategy for 2017?” The truth is that while the need […]

Read more →