This resource is no longer available

Cover Image
It has been well known for some time now that cyber threats to critical national infrastructure has been escalating with attacks like Stuxnet (2010), Night Dragon (2011) Shamoon (2012) and the recent attack on a Ukraine Power Station all making headline news. Of course, normal information assurance approaches used in the corporate environment may not be suitable for ICS. Challenges such patching or providing software updates onto a live system within an ICS network can leave some systems vulnerable to attack from malicious software. Add to this the risk of third parties (such as support organisations and other entities in the supply chain) being given connectivity via remote access, the chance of new threats being introduced from outside of the organisation increases significantly. Please join Palo Alto Networks for a live webinar to discuss how the threat landscape to ICS has meant that legacy technologies are no longer effective in stopping the different types of Cyber threats whilst achieving the all important goal of keeping the process protected yet uninterrupted.
Vendor:
Posted:
Apr 21, 2016
Premiered:
Apr 21, 2016, 05:00 EDT (09:00 GMT)
Format:
Type:
Webinar

This resource is no longer available.