New approaches to effective SCADA cybersecurity

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

It’s no secret that SCADA systems are vulnerable to compromise. Legacy industrial control systems weren’t designed with security in mind, emerging smart technologies are presenting new risks and new challenges are emerging as control systems migrate to IP networks.

The vulnerabilities of SCADA have been dramatically exposed in recent years, most notably by Stuxnet and Flame. With so many industrial processes in critical national infrastructure monitored and controlled by SCADA systems, there are growing fears that critical infrastructure may be at risk.

During this session a panel of industry experts will share their insight and expertise on how to tackle SCADA security challenges including:

  • How should government and industry collaborate and share information about threats and vulnerabilities?
  • How big are the risks to critical national infrastructure?
  • What are the critical controls needed in place for industrial control systems?

 

 

Speakers

Photo of Derek Brink

Derek Brink

Vice President, Research Fellow, Aberdeen Group

Photo of Patrick Miller

Patrick Miller

Founder, Director and President Emeritus, Energy S

Photo of Jonathan Pollet

Jonathan Pollet

Founder, Principal Consultant, Red Tiger Security

Photo of Victoria Windsor

Victoria Windsor

Moderator, Infosecurity Magazine

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.