Star 0

Abstract

This session combines original research on technical SCADA security challenges faced by organizations with some of the recently discovered SCADA vulnerabilities, and tries to decipher the SCADA crypt. It will identify avenues of attack and explain how critical infrastructures can be compromised. It will also provide mitigation strategies and security controls to secure against exploitation.