- which advantages the IEC 61850 standard offers for planning and operational management;
- which risks and specific attack vectors IEC 61850 infrastructures are exposed to;
- why classic security mechanisms are not effective;
- how to implement a Defense-in-Depth concept that meets the requirements national IT regulation and standards;
- how a Next Generation Intrusion Detection System for OT can take advantage of the IEC-61850 standard, make risks visible, and help prevent cyber attacks, manipulation, and operational disruptions.
Please fill in the form below to start the download.