Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Why Isn’t Anyone Paying Bounties for Zero Days? Chris Evans, CISO, HackerOne, Maddie Stone, Ethical Hacker and Rotem Bar, Ethical Hacker What’s your definition of a zero day? Exactly what a zero day is, and how one should be tackled when it comes to bug bounty, has been a contentious is... 5 months ago | 59 mins Critical Infrastructure Security 10 Years After Stuxnet Kim Zetter In 2010, the discovery of Stuxnet, the sophisticated virus used to sabotage Iran's nuclear program, ushered in a new era of warfare — in the digital r... 3 years ago | 74 mins Critical Infrastructure Security 10 Years After Stuxnet Kim Zetter In 2010, the discovery of Stuxnet, the sophisticated virus used to sabotage Iran's nuclear program, ushered in a new era of warfare — in the digital r... 3 years ago | 73 mins Defending IoT Devices Against Ransomware, Viruses and Worms Dean Weber, CTO, Mocana Cyber attacks are on the rise and becoming more dangerous impacting the safety of smart cities, smart homes and the Industrial IoT. Stuxnet, Black Ene... 6 years ago | 45 mins Operational Technology Security: Building a System of Trust Nick Savvides, Chief Technology Officer, APAC, Symantec As the 4th Industrial Revolution drives tremendous progress in energy, manufacturing, mining, transportation, and countless other Industrial Control S... 4 years ago | 63 mins Managing Security and Operational Risk Panel James Carder | Jeff Schmidt | Rob Sweeney | Stephen Dyson | Robert M. Lee | Sam Masiello Attacks on operational technology (OT) have been on the rise for decades. The rise began with the Stuxnet worm that attacked Programmable Logic Contro... 2 years ago | 54 mins Keeping the lights on | the real cyber security risks for ICS networks Andrew Barrett, Head of Utilities EMEA at Palo Alto Networks It has been well known for some time now that cyber threats to critical national infrastructure has been escalating with attacks like Stuxnet (2010), ... 7 years ago | 42 mins Stay Ahead of Cyber Threats - Are you ready for the emerging threat landscape? Yaniv Hoffman, Hung Huy Khong, Kempei Fukuda, Greg Sawyer, Ken Toh Join our global panel of experts to discuss the current and emerging threat landscape. Are you ready? • Is your organisation ready to fend off ransom... 1 year ago | 64 mins Defending ICS Against Cyberthreats with Next-Generation Security Del Rodillas, Sr. Product Marketing Manager at Palo Alto Networks A new threat landscape has emerged in Industrial Control Systems that is becoming more complex and sophisticated, to include game-changing attacks, li... 9 years ago | 61 mins Attacks Against Critical Infrastructures are Going Physical - 3 Use Cases Bernard Montel, Cyber Security Strategist at Tenable Attacks on critical infrastructure are not new. For several years now, all governments have been trying to address this essential issue for the contin... 1 year ago | 48 mins