Prevent cyber-attacks, industrial espionage, and sabotage on your ICS
Stuxnet, black-outs in Ukraine in 2015/2016, and Trisis/Triton malware are just some of the examples of how cyber-attacks can cause energy outages, delay complex physical and chemical processes, and jeopardize safety. Even when the attacks are not specifically targeted on ICS (Industrial Control System), like WannaCry and NotPetya malware, they can cause confusion and business losses in basically any kind of industrial production and operations.
And as ICSs are becoming deeply integrated into IT networks and industrial operations digitalized, they are becoming even more exposed to cyber-threats. In the webinar “How to Secure ICS/OT/IoT Environments with Cisco Cyber Vision?” we will discuss some of the key vulnerabilities and cyber-attack strategies in today’s ICS systems that are used in robotics, chemical and pharmaceutical production, power generation and distribution, oil production, manufacturing, industrial operations, etc. Daniel Grah, Cyber-Security Analyst at NIL will also explain how to address these cybersecurity issues with Cisco Cyber Vision.
At the end of the webinar, we will take a closer look at Cisco Cyber Vision in a demo cyber-attack against a simulated ICS. You will see on a practical example how Cisco Cyber Vision ensures the continuity, resilience, and safety of your industrial operations by providing continuous visibility into ICS infrastructures and controlling the risks of cyber-attacks.