For more webinars, go to: http://www.infonetics.com/infonetics-events/
The publicity surrounding the discovery of the Stuxnet worm in 2010 forced companies around the globe to take a serious look at the security posture of their OT (operational technology), particularly the security and visibility of SCADA and ICS operations. Solving the broad security problem for OT requires a deep understanding of cyber-physical systems, facilities and product development practices. The increasing connectivity of intelligent machines is compelling companies to take steps to secure their industrial devices, the supply chain and more. This webinar looks at fundamental OT security practices that OT managers and planners need to know to mitigate risks across people, processes and technologies.
WHO SHOULD ATTEND
Operational systems security and compliance managers, cross organization cyber security leaders, product developers at manufacturers, IT managers accountable for OT security, financial analysts and the media.
KEY TOPICS FOR DISCUSSION
-Why manufacturers need to understand and address security vulnerabilities early
-Best practices for ensuring a strong security posture
-How to independently validate security levels of products and practices
-Case studies of OT organizations based on people, processes and technology risks
-Answers to audience questions during live Q&A
-Jeff Wilson, Research Director, Cybersecurity Technology, Infonetics Research/IHS
-Kenneth Tom, Sr. Product Manager, Wurldtech Security Technologies
-Moderator: JoAnne Emery, Senior Manager, Webinar Events, Infonetics Research/IHS