Exposing Common Myths Around Cyberthreats to SCADA and ICS

"While awareness over the need for improved cybersecurity in SCADA and Industrial Control Systems (ICS) has improved in recent years, several inaccurate and dangerous assumptions about ICS cybersecurity best practices and the nature of cyber threats still persist. If held by organizations as fact, these myths could result in inadequate cyber-defensive measures and a high level of exposure to a range of attacks or even simple accidental cyber incidents both of which could have equally concerning consequences to process availability and safety.

Join ICS cybersecurity experts, Joe Weiss and Del Rodillas, to learn about:

- Common myths around cyberthreats to ICS and why they could be significant security gaps when held as truth
- Select real-world examples that highlight the consequences when malicious actors successfully exploit these gaps
- The more updated and accurate view to ICS cyberthreats as well as effective technologies which help asset owners build a stronger ICS security posture"
Watch Now

Spotlight

input#report_img { margin-right: 60px; } Data and applications reside everywhere, on the network, endpoints, and in the constantly evolving cloud ecosystem. As a result, organizations are now faced with securing a multitude of applications, users, devices and infrastructures – all hosting sensitive data that is critical to busi


OTHER ON-DEMAND WEBINARS

Indicators of Compromise: What's interesting, what's not and what else is needed

Intel security

While some indicators of compromise (IoCs) can be incredibly helpful in gaining visibility into the details and breadth of a breach, others can be noise. How do you decipher the difference between the good, the bad and the just plain ugly? Join Intel Security and (ISC)2 for a discussion on IoCs as we discuss what threat intelligence provides the most value along with where IoCs are going and should go next to better enable investigations and defend organizations.

Active Defense: Should Attack Victims 'Hack Back?'

Information Security Media Group

It's an ethical dilemma for many organizations and industry associations. If you perceive or receive a cyber threat, and you know the origin of that threat, do you have the right to make a pre-emptive or retaliatory strike against the actors?

Digital Privacy: Always on SSL & Perfect Forward Secrecy

"Last year brought a lot of news about government snooping and public attacks against certain encryption and hash algorithms. These developments should concern anyone that values data privacy. View this recorded session with the Online Trust Alliance and Akamai Technologies to discover the current best practices in securing your website and internal infrastructure. Learn how to implement Always on SSL (AOSSL) and Perfect Forward Secrecy (PFS) to better secure your data. Join us to learn: · How to implement AOSSL and PFS in your environment · What precautions you need to take to protect your website and intranet infrastructure"

"Best Practices for Implementing Security Ratings"

bitsight

"As mitigating third party risk becomes an essential business function across many industries, business relationships will be tested. Organizations must now subscribe to a “trust, but verify” philosophy to ensure their third parties are secure. To verify vendor security, organizations now use BitSight Security Ratings, which are gathered externally and don’t rely on any vendor input. Join Debbie Umbach, Director of Product Marketing at BitSight as she discusses the best practices for implementing vendor security ratings. Viewers will learn: - different approaches for incorporating BitSight Security Ratings into vendor risk management (VRM) programs, whether your program is just getting started or is well underway - how companies have used BitSight Security Ratings to notify key vendors of security incidents - how vendor ratings can allow for more effective communication and thus greater transparency"