Videos
IEC61850
IEC624434
IIoT & Grid-Edge
ITSIG-2.0
NIS2
The answer to all your questions: How does OT security monitoring with anomaly detection work? What must a network intrusion detection systems for industrial networks provide? And how do you manage to establish OT security even with a small team and in face of the prevailing OT security skills gap? Get your answers in under 3 minutes!
IEC61850
Can we automate the training of our anomaly detection in IEC 61850 infrastructures? Yes, and it's actually quite easy. With the.scd file, which acts as a digital twin of the infrastructure within the framework of the standard, the baseline for effective OT security monitoring is already available. We provide a brief explanation of how this works.
IEC61850
One of the most common protocols in (not only) IEC 61850 infrastructures is MMS (Manufacturing Message Specification). Unfortunately, the protocol can also be manipulated in a variety of ways. In this video, you will learn how this is possible and how it can affect the operation of critical infrastructure systems.
IEC61850
IEC 61850 infrastructures are rarely isolated, because the goal is to network different systems across different locations. This opens the floodgates to various attack vectors – from direct access via network components to supply chain compromise. We outline the threats and show where attackers can gain access.
IEC61850
How does the IEC 61850 standard achieve interoperability in utility automation systems? What exactly is defined to ensure communication between different devices with different protocols? A brief overview of the most important aspects of the international standard.
IEC61850
For utilities, the IEC 61850 standard is one of the most important standards for ensuring seamless communication between different networks, systems and locations. The keyword here is interoperability. In this video, we explain in a nutshell why no modern utility can afford to ignore this standard.
IEC61850
The IEC 61850 standard ensures compatibility in data communication between different utility systems and grids. But what about cybersecurity? Has the security of the protocols and guidance been considered? The short answer is no. Find out what this means for you in this video.