Protecting Water & Wastewater Utilities from Ransomware and Targeted Attacks

Logo
Presented by

MR Systems, AVEVA, Scheider Electric & Virsec

About this talk

As crippling ransomware and cyberattacks continue to hit critical aspects of water and wastewater systems, operators must implement robust measures to fortify their security stance. Water utilities face multiple challenges – from limited IT resources to maintain cybersecurity, to persistent vulnerabilities across various applications, components and services. Sophisticated attacks can hijack critical operations, disrupt business processes, steal or compromise sensitive data, and more. To appreciate the importance of an effective cybersecurity defense, look no further than the recent attacks on Israeli water facilities. Bad actors attempted to poison the water supply in residential areas by hijacking the software that controls the treatment pumps. Another thwarted attack aimed to disable pump operations and leave tens of thousands without access to water in the middle of a heatwave. Disruption and damage from attacks can impact: • Operating systems, website and database integrity, data security and more • Treatment and conveyance operations and processes • Alarms and other fail-safe and mitigating measures • Legal, financial and reputational exposure Featuring special guests: Paul Forney, Chief Security Architect, Schneider Electric Robert Touchton, Chief Technology Officer, MR Systems Vishal Mahna, Global Practice Head/Sr.Director, Monitoring and Control BU, AVEVA Satya Gupta, Chief Technology Officer & Co-Founder, Virsec Learn how to implement self-defending technology that protects against ransomware and other advanced attacks – both known and unknown – and ensure continuous, secure operations.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (95)
Subscribers (4254)
Virsec is the industry leader of application-aware server workload protection. Learn how to improve and optimize your security posture, ensure real-time protection from today's most dangerous cyber threats and attacks, including memory corruption, fileless and zero-day attacks. Hear valuable insights from cybersecurity leaders, experts and influencers, vulnerability analysis and more.