Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Why Isn’t Anyone Paying Bounties for Zero Days? Chris Evans, CISO, HackerOne, Maddie Stone, Ethical Hacker and Rotem Bar, Ethical Hacker What’s your definition of a zero day? Exactly what a zero day is, and how one should be tackled when it comes to bug bounty, has been a contentious is... 9 months ago | 59 mins Critical Infrastructure Security 10 Years After Stuxnet Kim Zetter In 2010, the discovery of Stuxnet, the sophisticated virus used to sabotage Iran's nuclear program, ushered in a new era of warfare — in the digital r... 3 years ago | 74 mins Critical Infrastructure Security 10 Years After Stuxnet Kim Zetter In 2010, the discovery of Stuxnet, the sophisticated virus used to sabotage Iran's nuclear program, ushered in a new era of warfare — in the digital r... 3 years ago | 73 mins Attacks Against Critical Infrastructures are Going Physical - 3 Use Cases Bernard Montel, Cyber Security Strategist at Tenable Attacks on critical infrastructure are not new. For several years now, all governments have been trying to address this essential issue for the contin... 1 year ago | 48 mins How High Assurance Code Signing Can Make You a Hero Peter DiToro, Thales e-Security "Advanced persistent threats (APTs) like Stuxnet and Duqu have caused many software-producing organizations to re-examine their code signing operation... 11 years ago | 42 mins Keeping the lights on | the real cyber security risks for ICS networks Andrew Barrett, Head of Utilities EMEA at Palo Alto Networks It has been well known for some time now that cyber threats to critical national infrastructure has been escalating with attacks like Stuxnet (2010), ... 7 years ago | 42 mins Defending ICS Against Cyberthreats with Next-Generation Security Del Rodillas, Sr. Product Marketing Manager at Palo Alto Networks A new threat landscape has emerged in Industrial Control Systems that is becoming more complex and sophisticated, to include game-changing attacks, li... 9 years ago | 61 mins Defending IoT Devices Against Ransomware, Viruses and Worms Dean Weber, CTO, Mocana Cyber attacks are on the rise and becoming more dangerous impacting the safety of smart cities, smart homes and the Industrial IoT. Stuxnet, Black Ene... 6 years ago | 45 mins Managing Security and Operational Risk in Critical Infrastructure Panel James Carder, Jeff Schmidt, Rob Sweeney, Stephen Dyson, Robert M. Lee, Sam Masiello Attacks on operational technology (OT) have been on the rise the for decades. The rise began with the Stuxnet worm that attacked Programmable Logic Co... 3 years ago | 54 mins Operational Technology Security: Building a System of Trust Nick Savvides, Chief Technology Officer, APAC, Symantec As the 4th Industrial Revolution drives tremendous progress in energy, manufacturing, mining, transportation, and countless other Industrial Control S... 4 years ago | 63 mins