Attacks Against Critical Infrastructures are Going Physical - 3 Use Cases

Presented by

Bernard Montel, Cyber Security Strategist at Tenable

About this talk

Attacks on critical infrastructure are not new. For several years now, all governments have been trying to address this essential issue for the continuity of services to citizens. If we all remember Stuxnet in 2010 or WannaCry in 2017, since the pandemic the number of attacks has been increasing, targeting organisations or services linked to people. The CISA in the United States and ENISA in the European Union are adapting their legal arsenal and regularly publish directives to strengthen measures related to the security of critical infrastructures (NIS-2 Directive). What are the purposes behind this type of attack? How and why do attackers particularly target these vital organisations? And how can we reduce the risk of these attacks against critical infrastructures? During this webinar, we will illustrate this topic through three domains that have been particularly affected in the last two years: Financial organisations, Education and Healthcare. We will take concrete examples using vulnerabilities on IT and OT networks, as well as attacks targeting Active Directory.

Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (137)
Subscribers (21332)
Steve Durbin, Chief Executive of the ISF and ISF analysts will present the ISF webinar series: "In pursuit of the secure organisation..." We will be sharing thought leadership and practical guidance drawn from ISF Members, which include many of the world’s leading Fortune and Forbes listed organisations) on how to address cyber, information security and risk management issues facing businesses and their security teams. 1. Emerging Cyber Threats (ISF Threat Horizon annual series) 2. The role of the CEO and business leaders in cyber security 3. Being a successful CISO 4. Cyber-attack trends 5. Critical Asset Management 6. Data breach prevention 7. Supply chain 8. Insider Threat and the role of the end user