Defending ICS Against Cyberthreats with Next-Generation Security

Presented by

Del Rodillas, Sr. Product Marketing Manager at Palo Alto Networks

About this talk

A new threat landscape has emerged in Industrial Control Systems that is becoming more complex and sophisticated, to include game-changing attacks, like Stuxnet. Aside from the threat of a "Son of Stuxnet" attack, asset owners now need to be concerned about field-originated attacks that "swim upstream", a growing base of ICS-specific exploits, and malicious use of industrial protocol functions. Given the ability of any of these threats to impact availability and safety, it is imperative that operators take them into consideration when developing their ICS cybersecurity strategy. In this webinar we look at the nature of both existing and emerging cyberthreats to ICS and why asset owners need to pay attention to them. Next, we present strategies and frameworks for defending your critical infrastructure against these threats. Finally, we discuss next-generation technologies that enable the requisite capabilities for granular network segmentation, least privilege access control based on users and applications (including ICS protocols/applications) and threat prevention for both known and zero-day attacks.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (657)
Subscribers (13398)
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security. Due to our partnerships, we are able to offer discounts on some of the most popular security certifications and training courses, including CEH, CISSP, CCISO, and more. www.infosec-careers.com This BrightTALK channel is an extension of the group and the ISCN website (www.infosec-careers.com), featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after. Key areas: InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more