People often associate AI in cybersecurity with network anomaly detection tools. Are there other use cases for AI and machine learning in OT cyber security? Isn’t AI expensive? How do I justify the cost of an AI solution? Read the full description of the session to find out what other topics/questions will be answered.
OT infrastructures across industrial sectors are increasingly becoming the target of sophisticated cyberattacks. During this panel discussion, experts will discuss strategies for preparing for, responding to and recovering from cyberattacks as a part of any business continuity plan.
Over the next 2-3 years, an emerging set of actors will drive significant new requirements for IIOT/ICS security: R-A-I-D.
Find out more in the full description of the session and live during the event.
Join this session to find out more about how TCG standards can be implemented today to provide increased security and protection from unauthorized ICS access.
Keynote speech: Cybersecurity Considerations for Smart Infrastructure
As they have taken on more capabilities over the years—both as a product of an increasingly connected world and to meet new demands—it is important to revisit what kind of vulnerabilities have been discovered in SCADA systems and learn how to secure them.