28 Solutions to the Cross-Sector ICS Nightmare

In February 2017, two researchers at the Georgia Institute of Technology simulated a cyber attack on a water treatment plant. Using ransomware, the academics managed to access programmable logic controllers (PLCs) to shut off valves, increase the chlorine content of water and show false information on computer displays.

The ICS world is riddled with weaknesses that are ready to be exploited by switched-on wrongdoers for currency and chaos. In this analysis we look at five of the most dangerous roots of ICS breach and how to best prevent them.

Please note: That all fields marked with an asterisk (*) are required.

Please Enter Your First Name
Please Enter Your Last Name
Please Enter Your Job Title
Please Enter Your Company Name
Please Enter Your Email Address
Please Enter Your Dialling Code
Please Enter Your Telephone
Please Select Your Country