Time is running out!
Operators of critical infrastructures in the energy and water sectors have less than 12 months to secure their network control and telecontrol systems with an efficient attack detection system. Firewalls are not enough. Network control and telecontrol technology is often a black box in terms of assets, access and operations. And staff and time are in short supply.
In this webinar, we talk with Alexander Harsch of CyberRange-e, the cybersecurity training center for utilities, about the challenges and best practices of cyber defense in critical infrastructure
In three entertaining presentations, you will learn:
The agenda
3 p.m. | What risks, anomalies and security gaps are commonplace in network control and telecontrol technology Richard Stüber, Sales Manager Rhebo |
3.20 p.m | What attack scenarios utilities should be prepared for, what difficulties the training companies experience, and what best practices have proven effective in defending against cyberattacks Alexander Harsch, Head of Cyber Security Resilience E.ON |
3.40 p.m. | »How to move from risk analysis to a functioning and running attack detection system in network control and telecontrol in just a few months and meet the ITSiG 2.0 deadline Richard Stüber, Sales Manager Rhebo |
About Richard Stüber
As Sales Manager of Rhebo GmbH, Richard Stüber is responsible for consulting and supporting new and existing customers from the energy, critical infrastructure and industrial automation sectors. The qualified IT specialist for system integration was able to gain valuable experience in the last 3 years on the topics of cybersecurity, threat detection and network stability in industry and IoT and deepen his industry knowledge. Mr. Stüber studied Business Informatics at the University of Leipzig and graduated with a Master of Science in 2018.
Alexander Harsch
Alexander Harsch has been head of the Cyber Resilience department at E.ON since 2016. He supports network operators and municipal utilities in the implementation, design and establishment of certifiable ISMS based on the IT security catalog of the Federal Network Agency and the international standards ISO / IEC 27001 and ISO / IEC TR 27019. Before that, he worked in management consultancy at PricewaterhouseCoopers for over 10 years "Cyber & Forensics" area.