Star 0

Abstract

How do industrial operators prevent insider attacks against critical infrastructure? Many industrial systems were never intended to be connected to shared networks and are air-gapped or separated. However, this approach has been discontinued as more systems need connectivity. Learn how vendors can build proactive IACS solutions to reduce risk and enable operators to secure physical plants.Learning Objectives:1: Gain an understanding of existing processes used to manage porous IACS environments.2: Understand the scale of the issue and why it exists.3: Develop a working knowledge of how IoE / cloud can solve these problems