Cyber-attacks can and do bring down everything from nuclear centrifuges to electric grids and production lines. In addition, digitalization of industrial operations is exposing your critical infrastructures to new cyber threats.
Join the webinar to learn more about the key vulnerabilities and cyber-attacks in ICS environments and how to protect your operations with Cisco Cyber Vision.
Prevent cyber-attacks, industrial espionage, and sabotage on your ICS
Stuxnet, black-outs in Ukraine in 2015/2016, and Trisis/Triton malware are just some of the examples of how cyber-attacks can cause energy outages, delay complex physical and chemical processes, and jeopardize safety. Even when the attacks are not specifically targeted on ICS (Industrial Control System), like WannaCry and NotPetya malware, they can cause confusion and business losses in basically any kind of industrial production and operations.
And as ICSs are becoming deeply integrated into IT networks and industrial operations digitalized, they are becoming even more exposed to cyber-threats.
Webinar details
In the webinar “How to Secure ICS/OT/IoT Environments with Cisco Cyber Vision?” we will discuss some of the key vulnerabilities and cyber-attack strategies in today’s ICS systems that are used in robotics, chemical and pharmaceutical production, power generation and distribution, oil production, manufacturing, industrial operations, etc. Daniel Grah, Cyber-Security Analyst at NIL (part of Conscia Group) will also explain how to address these cybersecurity issues with Cisco Cyber Vision.
At the end of the webinar, we will take a closer look at Cisco Cyber Vision in a demo cyber-attack against a simulated ICS. You will see on a practical example how Cisco Cyber Vision ensures the continuity, resilience, and safety of your industrial operations by providing continuous visibility into ICS infrastructures and controlling the risks of cyber-attacks.
About the presenter
Danijel Grah, Cybersecurity Analyst, NIL
Danijel Grah has been in cybersecurity for almost ten years. He began his career as a consultant, later moved into research, and today at NIL, he works as a Cybersecurity Analyst in the Security Operations Center (SOC). Daniel has rich experience in penetration testing and security hardening, programming, consulting, and developing systems of cyber defense.
He has published and presented research papers at various international conferences in the field of information security, and he has confirmed his knowledge and experience with industry certificates, such as GRID.