Managing Director AKS IT Services Noida, Uttar Pradesh, India
Security is utmost important for industrial control systems. So is reducing an attack surface by carefully designed network architecture, vulnerability management and identification and access control. Management of physical and electronic access, role-based access control, use of SIEM to monitor logs, real-time monitoring of alerts and incidents -- all are important. Policy requirements and their implementation. SoPs for handling of Incidents. Steps for conduct of security audit of ICS and precautions to be taken while running any vulnerability scanner. In a nutshell, cyber risk needs to be suitably mitigated for safe and reliable operations.
Learning Objectives:
Describe critical cybersecurity requirements of ICS for smooth running of processes in critical information infrastructure of any country.
Define ICS risk assessment and mitigation by considering threat intelligence, possible threat vectors, vulnerabilities, likelihood of exploitation of vulnerabilities and its impact on business. Based on this participants will be able to also define mitigation measures like modification of policies, implementation of technology and training.
Describe brute force attacks like Distributed Denial of Service, which can disrupt functioning of processes that may result in loss of life and non-availability of services.