Best Practices for ICS and OT Security
Senior Sales Engineer, Trend Micro
This era of digital transformation finds work sites all over the world caught up in adapting to new technologies, such as predictive maintenance, autonomous mobile robots, and digital twins of production lines and products. With 60% of factories already relying on the cloud and 26% on Private 5G, this enhanced connectivity is empowering assets with new functionality and increased convenience, but in the 61% of factories that have experienced cyber incidents, those benefits are likely to have been leveraged by attackers as well. As soon as any technology is introduced to a worksite, the attackers immediately get to work developing ways to exploit it for maximum disruption as quickly as possible. In this presentation, you will get a look at what kinds of attacks bad actors will attempt over which kinds of OT/ICS Environments, the potential damage that can result, and up-to-date recommendations on how to provide reliable security.