Greater Atlanta Cyber Security for Control Systems Meetup @ Stromquist – Aug 2 @ 6:30 PM
BOOM BOOM (OUT GO THE LIGHTS): A LOOK AT TWO CONFIRMED ICS ATTACKS Doug Wylie will be speaking with us about two confirmed examples
BOOM BOOM (OUT GO THE LIGHTS): A LOOK AT TWO CONFIRMED ICS ATTACKS Doug Wylie will be speaking with us about two confirmed examples
Okay… Your control system was installed a couple of years ago and you were handed riser diagrams, As-Builts, mechanical drawings, etc. and you were good
Helps You Identify Vulnerabilities in Your BAS SmartCore will translate your answers to this short survey into a Threat Assessment Scorecard as well as a prescriptive Cyber Risk
ONLINE ASSESSMENT AT NO CHARGE TO YOU SmartCore has developed an online assessment tool that gives building and portfolio management a high level assessment
This Cybersecurity seminal document, written by Konkana Khaund, Principal Consultant, Energy & Environment, at Frost & Sullivan, takes a “History Channel” look at the whole
I think that the president is looking to use cyber security as a “legacy” play for his last year in office. It is the one
Ken Smyers, Fred Gordy and I talk a lot about how hackers use vunerablities in BAS systems to get into places they should not. Pablos
If you haven’t looked at Shodan maps maybe you should. It shows a stark visualization of just how exposed we are. The above image shows
According to an arstechnica article Monday, August 24, a federal appeals court ruled that the Federal Trade Commission (FTC) can now sue a company that
Finding Devices, Protocols, Vendors, etc. Disclaimer – It is not the intent of this post to point out a particular BAS software vendor, protocol, or