SCADA security - who is really in control of our control systems?

Peter Allor IBM

No longer are hackers blasting far-reaching worms. They are quietly targeting government, financial and communications networks, as well as the back-end networks that control our power, oil/gas, manufacturing, water and transportation systems. In most cases, these control systems themselves don't support authentication, encryption or even the most basic validation protocols. Under contract with our customers, IBM Internet Security Systems has pen-tested many of the world's most important national SCADA networks and can confirm that lawmakers in Washington are rightly concerned that this lack of security could easily lead to a major incident. The Internet landscape is constantly evolving and businesses and governments must be prepared to protect against the ploys and illegal activities of the next generation of organized crime.

This session will discuss the various steps that business and governments must take in order to combat these limitless threats, including both technological advancements and better sharing of best practices between organizations.


We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.