In recent months we have seen a surge of high-profile cyberattacks on nearly every sector. Colonial Pipeline shook the average citizen and was a portent of things that could come to pass. The systems in place like SCADA, PLCs, and others were often made for ease of use and did not include a robust security process in their design. Add to that legacy systems, remote access, and a shortage of key IT security staff, and we see a wide attack surface with many vulnerabilities.
What we will cover during the session: