InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Analysis of the Florida Water Utility Cyberattack

Presented by

Robert Touchton - MR Systems, Satya Gupta - Virsec, Saurabh Sharma - Virsec

About this talk

Water and wastewater treatment plants are some of the most vulnerable critical infrastructure targets in the United States. Many of these facilities are underfunded, under-resourced and are not monitored 24/7. Throw into the mix vulnerable legacy applications and operating systems, and you might as well send out engraved invitations for hackers to come on in! Residents of Oldsmar, Florida were lucky that a plant manager happened to notice the hack in real-time and was able to stop the attempted poisoning of the entire city’s population. But water utilities shouldn’t have to rely on luck to prevent such dangerous attacks. Experts from Virsec and MR Systems discuss what's known about the recent attack on the Florida Water Utility that compromised security and exposed direct access to a critical SCADA system. Get action items you can implement right now to harden your system's defenses immediately. Distinguished guests include Robert Touchton, Chief Technology Officer, MS Systems Satya Gupta, Chief Technology Officer and Co-Founder, Virsec Saurabh Sharma, VP Sales ICS & Strategic Partnerships, Virsec
Virsec

Virsec

4421 subscribers58 talks
Security from the Inside
Virsec is the industry leader of application-aware server workload protection. Learn how to improve and optimize your security posture, ensure real-time protection from today's most dangerous cyber threats and attacks, including memory corruption, fileless and zero-day attacks. Hear valuable insights from cybersecurity leaders, experts and influencers, vulnerability analysis and more.
Related topics