Tuesday, 5 July 2016

Managing and Supporting an ICS Program

"With the rapid adoption of new technology supporting critical utility operations, a security program must adapt to address the most significant risks while paying close attention to the threats. Old school methodologies for solving security challenges do not scale nor make financial sense in a world where motivated attackers are incredibly successful penetrating their targets. Companies have to adapt to a model where threat intelligence and control maturity drives security operations and investments. This talk will focus on the practical implementation of threat based security operations and how to translate those concepts to senior management and your board of directors."

Learn more about this Presentation at the 3rd Annual Industrial Control Cybersecurity USA conference

No comments:

Post a Comment

Contact us for more information


Email *

Message *

Google+ Followers

Follow by Email