On 15th December Edwin Melenhorst, Jérôme Arnaud and Jos Zenner speaking about the challenges occurring through simplification in the IEC61850 surrounding.
The BSI has published guidance on IT-SiG 2.0. Klaus Mochalski sheds light on BSI.
Time is running out! Operators of critical infrastructures in the energy and water sectors have less than 12 months to secure their network control and telecontrol systems with an efficient attack detection system.
In the fourth webcast on November 30, the focus is now on the implementation of IT-SiG 2.0 in practice . The speakers will explain to users how they can implement an attack detection system within a short time and what they should look out for.
The third webcast on September 14 will focus on implementing the requirements of IT-SiG 2.0 through a holistic, efficient threat and attack detection system in brownfield facilities.
Klaus Mochalski talks about what a holistic, effective system for attack detection in energy companies can look like.
ITSiG 2.0 in practice: How energy providers can set up an attack detection system within a few months.
The IT-SiG 2.0 tightens the cybersecurity requirements of energy supply companies. This webcast serves as the prelude to a series of webinars on IT-SiG 2.0.
In his lecture, Dr. Frank Stummer will speak about mechanisms and solutions for protecting OT infrastructure in an industrial environment.
Syskron shares and discusses the experiences from daily security operations, especially for production systems, with the participants.
In this webcast you will find out, how PAESSLER and Rhebo control their industrial control networks.
Learn more about why a central monitoring is not enough to fully protect substations, which threats you currently can't detect in your substation ICS and how you can implement a seamless intrusion detection system for your entire infrastructure.
Learn from the experts of Rhebo and Barracuda how to implement a holistic and integrative cybersecurity concept.
Learn from our experts how Rhebo secures your IoT fleet.
Together with Phoenix Contact we clarify reasons for outages in an ICS-driven production.
Learn from our experts what is important to ensure cyber security in networks of renewables.
Learn from our experts how to secure your production from downtimes and cyber attacks.
What can you expect from the new IT security act? In cooperation with INSYS icom, Rhebo answers to your questions.
Learn from our expert, how to implement the norm IEC 62443 in your production.
We show in cooperation with INSYS icom the integration possibilities of Rhebo Industrial Protector.
Very few companies in critical infrastructure are able to implement the legal actual requirements. Rhebo shows you how to follow the current regulations.