Managing Security and Operational Risk in Critical Infrastructure Panel

Logo
Presented by

James Carder, Jeff Schmidt, Rob Sweeney, Stephen Dyson, Robert M. Lee, Sam Masiello

About this talk

Attacks on operational technology (OT) have been on the rise the for decades. The rise began with the Stuxnet worm that attacked Programmable Logic Controllers (PLCs) in SCADA systems and has increased sharply in the last few years. Not only do these attacks threaten national interests, but as OT continues to be vital in day to day operations, overall business continuity is also endangered. As such, detecting OT threats has become a top priority as governments and organizations around the world implement programs and deliver mandates to protect critical infrastructure and business operations, across all sectors and verticals. While limiting security and operational risk is a crucial issue, sometimes it’s easier said than done. Join our replay of "Managing Security and Operational Risk in Critical Infrastructure Panel" -- a top viewed session from this year's RhythmWorld conference. In this panel, security experts from across industries discuss business challenges, ways to evaluate risk, and strategies to reduce business risk with operational technology. Moderated by James Carder, LogRhythm Chief Security Officer. Discover: - Overview of operational risk and technologies associated with different critical industry - How security plays a role in operations and achieving business continuity - Ways your peers have effectively met business challenges - Recommendations to manage security and operational Risk
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (257)
Subscribers (76931)
LogRhythm helps security teams stop breaches by turning disconnected data and signals into trustworthy insights. From connecting the dots across diverse log and threat intelligence sources to using sophisticated machine learning that spots suspicious anomalies in network traffic and user behavior, LogRhythm accurately pinpoints cyberthreats and empowers professionals to respond with speed and efficiency. With cloud-native and self-hosted deployment flexibility, out-of-the-box integrations, and advisory services, LogRhythm makes it easy to realize value quickly and adapt to an ever-evolving threat landscape. Together, LogRhythm and our customers confidently monitor, detect, investigate, and respond to cyberattacks. Learn more at logrhythm.com