A tested battle plan for verifying the security of your ICS and SCADA systems? Here it is!

ICS Hacking Exposed is the guide created by Clint E. Bodungen (researcher in the field of ICS and SCADA Security and penetration test expert with more than 20 years of experience) and others with the collaboration of the MC Graw Hill Education Publishing House, which will make you more it's easy to verify the security in your application or network.

A manual that will guide you step-by-step in verifying your systems, showing you weaknesses and "backdoors" you didn't suspect existed: Tuesday 28 March the author will participate in the webinar “Hacking Exposed ICS: Overview of ICS Risk Assessment and Threat Modeling”.

ICS hacking exposed
ICS hacking exposed

Want to join the webinar? Easy, here is the link to register

REGISTRATION: https://www.sans.org/webcasts/hacking-exposed-ics-overview-ics-risk-assessment-threat-modeling-104432

The 4 points listed below will be answered:

  • How to speed up the safety of your systems
  • What strategy to use to ensure the operation of the OT in a less complex and costly way
  • How to multiply the safety and efficiency of your team using the right technologies
  • How to "map" your architecture and define permitted directions and volumes of data traffic

Sul ServiTecno website you will find many contributions (white papers, case histories, products&services, etc…) on how to defend supervisory systems and distributed architectures from hacker attacks

Below is the link for registration.

REGISTRATION: https://www.sans.org/webcasts/hacking-exposed-ics-overview-ics-risk-assessment-threat-modeling-104432