Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Webcast: Industrial Cyber Security: How Much Is Enough?

A cyber incident in an industrial control system can have serious consequences, and all security technologies have limitations. This means we can always be more secure, or less.

We could force-fit cyber risks into more conventional models by “making up” numbers for the probability of serious incidents, but “made up” numbers yield poor business decisions.

A cyber incident in an industrial control system can have serious consequences, and all security technologies have limitations. This means we can always be more secure, or less.

We could force-fit cyber risks into more conventional models by “making up” numbers for the probability of serious incidents, but “made up” numbers yield poor business decisions.

How then, should we evaluate security funding requests for industrial sites? How do we know how much is enough?

Join us for this webcast on May 18th to explore using attack scenarios to communicate risks, consequences, and costs to business decision-makers.


Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

ICS/OT

Wago has patched critical vulnerabilities that can allow hackers to take complete control of its programmable logic controllers (PLCs).

ICS/OT

Cybersecurity firm Forescout shows how various ICS vulnerabilities can be chained for an exploit that allows hackers to cause damage to a bridge.

ICS/OT

More than 1,300 ICS vulnerabilities were discovered in 2022, including nearly 1,000 that have a high or critical severity rating.

ICS/OT

Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.

Cybersecurity Funding

Internet of Things (IoT) and Industrial IoT security provider Shield-IoT this week announced that it has closed a $7.4 million Series A funding round,...

ICS/OT

Siemens and Schneider Electric address nearly 100 vulnerabilities across several of their products with their February 2023 Patch Tuesday advisories.