The Central ICS/SCADA Cyber Security Event of the Year for the APAC Region! This year’s conference will have THREE full days of content, and receptions and networking opportunities. You canregister for the conference online to hold a spot.
The speaker will walk the audience through the cyber kill chain process of how, in theory, an attempt to breach a typical manufacturing plant from the process of reconnaissance, weaponization, delivery, exploitation, installation, C&C can be achieved. With this theoretical attack, the process of defending each kill chain will be explained. In closing, apart from all the implemented defense method, the weakest link would still be the human element and how this can be addressed with touch of care and paranoia.