Critical Infrastructure Security 10 Years After Stuxnet

Presented by

Kim Zetter

About this talk

In 2010, the discovery of Stuxnet, the sophisticated virus used to sabotage Iran's nuclear program, ushered in a new era of warfare — in the digital realm. It placed critical infrastructure around the world in the cross hairs by demonstrating how a remote digital attack could be done anonymously, and have as much destructive capability as a physical attack. As we approach the ten-year anniversary of this discovery, what have we learned? Since Stuxnet, there have been subsequent attacks against critical infrastructure that show us where the threat landscape is headed. In this talk, attendees will learn: · What Stuxnet showed us about the ways in which critical infrastructure systems that manage electric grids, water treatment plants, traffic systems and more, are vulnerable to cyber attacks · The kinds of attacks we’ve seen since then, such as the assault on Ukraine’s power grid and the attack that targeted a Saudi Arabian chemical plant · Lessons learned from Stuxnet and these subsequent attacks that show the mistakes that made them possible — plus best practices for winning against them

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (60)
Subscribers (8181)
Improve business outcomes with our end-to-end IoT solutions designed to help you securely connect assets, applications, and data in real time to apply transformative business changes in both carpeted and non-carpeted spaces. As cyber attacks on industrial environments increase in frequency and complexity, protecting your IoT/OT networks has become critical. Are you taking the right measures? Take this questionnaire to determine your profile based on eight IoT/OT security practices your peers are implementing: