Top 20 Cyber Attacks on ICS
Featured
Description
This webinar reviews a standard set of Top 20 ICS cyber attacks as a methodology for communicating cyber-sabotage risk. Full report is available for download here: https://waterfall-security.com/20-attacks.
The Top 20 set representing ICS attacks of varying levels of cyber and engineering sophistication, and with varying degrees of undesirable physical consequences. We recommend that a standard Top 20 includes both ICS attacks that are reliably defeated by existing cyber defenses, and attacks that are not so defeated.
Comments