In this webcast, Rhebo's OT expert and digital forensics specialist Dr. Frank Stummer sheds light on the 10 most common security vulnerabilities.
On 15th December Edwin Melenhorst, Jérôme Arnaud and Jos Zenner speaking about the challenges occurring through simplification in the IEC61850 surrounding.
Industrial networks and devices are insecure! Really? What security risks can you find? In this webcast, we talk from the inside of our OT/IIoT monitoring with anomaly detection.
The BSI has published guidance on IT-SiG 2.0. Klaus Mochalski sheds light on BSI.
Time is running out! Operators of critical infrastructures in the energy and water sectors have less than 12 months to secure their network control and telecontrol systems with an efficient attack detection system.
In the fourth webcast on November 30, the focus is now on the implementation of IT-SiG 2.0 in practice . The speakers will explain to users how they can implement an attack detection system within a short time and what they should look out for.
The third webcast on September 14 will focus on implementing the requirements of IT-SiG 2.0 through a holistic, efficient threat and attack detection system in brownfield facilities.
Klaus Mochalski talks about what a holistic, effective system for attack detection in energy companies can look like.
ITSiG 2.0 in practice: How energy providers can set up an attack detection system within a few months.
The IT-SiG 2.0 tightens the cybersecurity requirements of energy supply companies. This webcast serves as the prelude to a series of webinars on IT-SiG 2.0.
In his lecture, Dr. Frank Stummer will speak about mechanisms and solutions for protecting OT infrastructure in an industrial environment.
Syskron shares and discusses the experiences from daily security operations, especially for production systems, with the participants.
In this webcast you will find out, how PAESSLER and Rhebo control their industrial control networks.
Learn more about why a central monitoring is not enough to fully protect substations, which threats you currently can't detect in your substation ICS and how you can implement a seamless intrusion detection system for your entire infrastructure.