Prevent cyber-attacks, industrial espionage, and sabotage on your ICS
Stuxnet, black-outs in Ukraine in 2015/2016, and Trisis/Triton malware are just some of the examples of how cyber-attacks can cause energy outages, delay complex physical and chemical processes, and jeopardize safety. Even when the attacks are not specifically targeted on ICS (Industrial Control System), like WannaCry and NotPetya malware, they can cause confusion and business losses in basically any kind of industrial production and operations.
And as ICSs are becoming deeply integrated into IT networks and industrial operations digitalized, they are becoming even more exposed to cyber-threats. In the webinar “How to Secure ICS/OT/IoT Environments with Cisco Cyber Vision?” we discussed some of the key vulnerabilities and cyber-attack strategies in today’s ICS systems that are used in robotics, chemical and pharmaceutical production, power generation and distribution, oil production, manufacturing, industrial operations, etc. Daniel Grah, Cyber-Security Analyst at NIL will explained how to address these cybersecurity issues with Cisco Cyber Vision.
You must enable cookies in order to watch the video.
At the end of the webinar, we took a closer look at Cisco Cyber Vision in a demo cyber-attack against a simulated ICS. You will see on a practical example how Cisco Cyber Vision ensures the continuity, resilience, and safety of your industrial operations by providing continuous visibility into ICS infrastructures and controlling the risks of cyber-attacks.