New approaches to effective SCADA cybersecurity

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

It’s no secret that SCADA systems are vulnerable to compromise. Legacy industrial control systems weren’t designed with security in mind, emerging smart technologies are presenting new risks and new challenges are emerging as control systems migrate to IP networks.

The vulnerabilities of SCADA have been dramatically exposed in recent years, most notably by Stuxnet and Flame. With so many industrial processes in critical national infrastructure monitored and controlled by SCADA systems, there are growing fears that critical infrastructure may be at risk.

During this session a panel of industry experts will share their insight and expertise on how to tackle SCADA security challenges including:

  • How should government and industry collaborate and share information about threats and vulnerabilities?
  • How big are the risks to critical national infrastructure?
  • What are the critical controls needed in place for industrial control systems?




Derek Brink

Vice President, Research Fellow, Aberdeen Group

    Patrick Miller

    Founder, Director and President Emeritus, Energy S

      Jonathan Pollet

      Founder, Principal Consultant, Red Tiger Security

        Victoria Windsor

        Moderator, Infosecurity Magazine

        Should you register for this event your information will be shared with the sponsor indicated above. Please see Infosecurity Magazine’s privacy policy for additional information.