Managing Security and Operational Risk Panel

Logo
Presented by

James Carder | Jeff Schmidt | Rob Sweeney | Stephen Dyson | Robert M. Lee | Sam Masiello

About this talk

Attacks on operational technology (OT) have been on the rise for decades. The rise began with the Stuxnet worm that attacked Programmable Logic Controllers (PLCs) in SCADA systems and has increased sharply in the last few years. Not only do these attacks threaten national interests, but as OT continues to be vital in day to day operations, overall business continuity is also endangered. As such, detecting OT threats has become a top priority as governments and organisations around the world implement programs and deliver mandates to protect critical infrastructure and business operations, across all sectors and verticals. While limiting security and operational risk is a crucial issue, sometimes it’s easier said than done. Watch this panel to hear security experts from across industries discuss business challenges, ways to evaluate risk, and strategies to reduce business risk with operational technology. You’ll learn: - Overview of operational risk and technologies associated with different critical industry - How security plays a role in operations and achieving business continuity - Ways your peers have effectively met business challenges - Recommendations to manage security and operational risk Speakers: James Carder, CSO, LogRhythm | Jeff Schmidt, CEO, Avertium | Rob Sweeney, Senior Information Security Engineer, Penn Medicine | Stephen Dyson, Sr. Security Operations Analyst, Penn Medicine | Robert M. Lee, CEO, Dragos | Sam Masiello, CSO, Gates Corporation

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (87)
Subscribers (18990)
We know your job isn’t easy. That’s why we combine log management, machine learning, SOAR, UEBA, and NDR to give you broad visibility across your environment so you can quickly uncover threats and minimise risk. But a mature SOC doesn’t just stop threats. With LogRhythm, you’ll easily baseline your security operations program and track your gains — so you can easily report your successes to your board. Hear best practices, see technology demos, listen to speaker panels on our European BrightTALK channel. Visit our website for more information: http://www.logrhythm.com/