Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

New approaches to effective SCADA cybersecurity

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

It’s no secret that SCADA systems are vulnerable to compromise. Legacy industrial control systems weren’t designed with security in mind, emerging smart technologies are presenting new risks and new challenges are emerging as control systems migrate to IP networks.

The vulnerabilities of SCADA have been dramatically exposed in recent years, most notably by Stuxnet and Flame. With so many industrial processes in critical national infrastructure monitored and controlled by SCADA systems, there are growing fears that critical infrastructure may be at risk.

During this session a panel of industry experts will share their insight and expertise on how to tackle SCADA security challenges including:

  • How should government and industry collaborate and share information about threats and vulnerabilities?
  • How big are the risks to critical national infrastructure?
  • What are the critical controls needed in place for industrial control systems?

 

 

Speakers

Derek Brink

Vice President, Research Fellow, Aberdeen Group

    Patrick Miller

    Founder, Director and President Emeritus, Energy S

      Jonathan Pollet

      Founder, Principal Consultant, Red Tiger Security

        Victoria Windsor

        Moderator, Infosecurity Magazine