Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

action image header it logic
Forums it-sa Expo Knowledge Forum C

Software vulnerabilities: Future challenges

CERT@VDE , a platform for coordinating OT security issues specifically for SMEs in the field of industrial automation.

calendar_today Wed, 26.10.2022, 12:30 - 13:00

event_available On site

Action Video

south_east

Action description

south_east

Speaker

south_east

Themes

Legislation, standards, regulations Industry 4.0 / IoT / Edge Computing Network Security / Patch Management

Event

This action is part of the event Forums it-sa Expo

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description


In the age of Industry 4.0, new challenges for IT security in industrial automation arise from increasing digitalisation. Just as the efficiency and reach of production multiply with increasing networking, the vulnerability of overall IT systems also increases. The high risk of targeted cyber attacks and the associated damage and production downtime calls for new concepts in dealing with IT security in the automation industry.

While large companies often already have their own emergency teams (so-called Computer Emergency Response Teams, CERT) and specialised product security teams (Product Security Incident Response Teams, PSIRT), these are usually not available in small and medium-sized enterprises (SMEs) or have only limited resources. In addition, they often lack routine in dealing with vulnerabilities, in creating security alerts (advisories) and in communicating, e.g. with external security researchers or with other CERTs, such as the ICS-CERT in the USA. In addition, most manufacturers have so far been working on a solution alone. There is usually no cross-company exchange, although a vulnerability often affects different manufacturers and synergy effects can be used through cooperation. In the event of a serious vulnerability, SMEs lack experience, expertise and information to master the acute th
... read more

Language: German

Questions and Answers: No

Speaker

show more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.