TRITON/TRISIS: Lessons Learned, and What You Should Do Now

แชร์
ฝัง
  • เผยแพร่เมื่อ 19 ก.ย. 2024
  • What if cyber attackers could penetrate, take control of, and disable - even destroy - critical infrastructure systems? With more than 40 years of industry experience, Gary Williams, Senior Director,
    Technology, Cybersecurity and Communications for Schneider Electric, analyzes lessons learned from the August 2017 TRITON/
    TRISIS malware attack. One of only five known attacks to exploit industrial control systems, TRITON/TRISIS could have resulted in catastrophic damages and loss of life. And because it targeted both the SIS and the DCS simultaneously, everyone associated with industrial manufacturing must immediately reconsider their security
    posture. In this session, Williams will explain why the attack’s tradecraft is a call to action: It’s time to change industry’s security culture via a stronger commitment to best practices, standards and new levels of openness and collaboration. Using TRITON/TRISIS as an example, we can - and must - design, operate and protect a more secure future.

ความคิดเห็น •