InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Reduce Your Risk: Best Practices for Securing OT and SCADA Networks

Presented by

Allyn Lynd, DFIR Senior Advisor, CRITICALSTART and Chase Dardaman, Sr. Adversarial Engineer, CRITICALSTART

About this talk

How vulnerable is your operational technology? In sectors ranging from manufacturing and utilities to transportation and healthcare, automation makes work easier and more efficient. However, increased automation brings greater security risks and more opportunities for hackers who are looking to disrupt and exploit OT environments. Join CRITICALSTART TEAMARES security experts, Allyn Lynd (Blue team) and Chase Dardaman (Red team.) In this one-hour session, you will learn best practices to: •Deploy and maintain security for your OT / SCADA devices (spoiler alert: number one is OT/IT segmentation). •Design new OT / SCADA systems integrating security from the beginning as opposed to after it has been deployed. •Ensure your incident response plan has what it takes to limit damages from breaches. •Build your business case to secure approval and funding for new security measures. Not enough? How about actual use cases of OT / SCADA attacks; Allyn will share from his experience working as an FBI agent.
Critical Start

Critical Start

859 subscribers11 talks
Resolve every alert. Stop breaches.
Critical Start is the only MDR provider committed to eliminating acceptable risk and leaving nothing to chance. We believe that companies should never have to settle for “good enough.” Our award-winning portfolio includes end-to-end Professional Services and Managed Detection and Response (MDR). Our MDR puts a stop to alert fatigue by leveraging our ZTAP platform plus industry-leading Trusted Behavior Registry, which eliminates false positives at scale by resolving known-good behaviors. Driven by 24x7x365 human-led, end-to-end monitoring, investigation and remediation of alerts, our on-the-go threat detection and response capabilities are enabled via a fully interactive MOBILESOC.
Related topics