SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
Metropolitan Solutions Conference | Security and Reliability for Urban Infrastructures | San Jose, CA | November 6 2012
phone: 1-877-267-4732 | web: www.energysec.org | email: info@energysec.org | twitter: @energysec
phone: 1-877-267-4732 | web: www.energysec.org | email: info@energysec.org | twitter: @energysec
phone: 1-877-267-4732 | web: www.energysec.org | email: info@energysec.org | twitter: @energysec
phone: 1-877-267-4732 | web: www.energysec.org | email: info@energysec.org | twitter: @energysec
phone: 1-877-267-4732 | web: www.energysec.org | email: info@energysec.org | twitter: @energysec
Metropolitan Solutions Conference | San Jose, CA | November 6 2012
phone: 1-877-267-4732 | web: www.energysec.org | email: info@energysec.org | twitter: @energysec
phone: 1-877-267-4732 | web: www.energysec.org | email: info@energysec.org | twitter: @energysec
Credits
                             Presentation by Patrick C Miller, President and CEO, EnergySec, patrick.miller@energysec.org
                          Slide 1 photo by OiMax, creative commons license http://www.flikr.com/photos/72398314@N00
                          Slide 2 photo by alainv4, creative commons license http://www.flikr.com/photos/12236584@N00
                    Slide 3 photo by _Geronimo_, creative commons license http://www.flikr.com/photos/90313537@N00
               Slide 4 photo by Kitty Terwolbeck, creative commons license http://www.flikr.com/photos/59800091@N04
                   Slide 5 photo by ShapeThings, creative commons license http://www.flikr.com/photos/84579440@N00
                   Slide 6 photo by jculverhouse, creative commons license http://www.flikr.com/photos/26615819@N07
                   Slide 7 photo by nickwheeleroz, creative commons license http://www.flikr.com/photos/7762644@N04
                          Slide 8 photo by norsez, creative commons license http://www.flikr.com/photos/42918851@N00
                          Slide 9 photo by Muffet, creative commons license http://www.flikr.com/photos/53133240@N00
Presented at Santa Clara Convention Center, Great American Ballroom, 5001 Great America Pkwy., Santa Clara, CA 95054
                                                                           Made with HaikuDeck and Microsoft PowerPoint




     phone: 1-877-267-4732 | web: www.energysec.org | email: info@energysec.org | twitter: @energysec

Weitere ähnliche Inhalte

Ähnlich wie How to Avoid the Next STUXNET In Your Control Systems

An Informed World - Awareness Through Social Media
An Informed World - Awareness Through Social MediaAn Informed World - Awareness Through Social Media
An Informed World - Awareness Through Social Mediab_swift
 
Sacrificed Privacy
Sacrificed PrivacySacrificed Privacy
Sacrificed PrivacyLaura Kong
 
Sacrificed Privacy
Sacrificed Privacy Sacrificed Privacy
Sacrificed Privacy Laura Kong
 
Nomophobia; are you addicted to your smartphone?
Nomophobia; are you addicted to your smartphone?Nomophobia; are you addicted to your smartphone?
Nomophobia; are you addicted to your smartphone?Alice Guo
 
CIPD Cov & Warks Branch Event 22 01 2015
CIPD Cov & Warks Branch Event 22 01 2015CIPD Cov & Warks Branch Event 22 01 2015
CIPD Cov & Warks Branch Event 22 01 2015Perry Timms
 
How to Plan For Product Success by CA Technologies VP of Product
 How to Plan For Product Success by CA Technologies VP of Product How to Plan For Product Success by CA Technologies VP of Product
How to Plan For Product Success by CA Technologies VP of ProductProduct School
 
An Informed World - Creating Awareness Through Social Media
An Informed World - Creating Awareness Through Social MediaAn Informed World - Creating Awareness Through Social Media
An Informed World - Creating Awareness Through Social Mediab_swift
 
Investing Goes Personal: A Look at Crowdfunding in the Digital Age
Investing Goes Personal: A Look at Crowdfunding in the Digital AgeInvesting Goes Personal: A Look at Crowdfunding in the Digital Age
Investing Goes Personal: A Look at Crowdfunding in the Digital AgeLaura Bossy
 
Sacrificed Privacy
Sacrificed Privacy Sacrificed Privacy
Sacrificed Privacy Laura Kong
 
Kickstarting your creativity and how to succeed
Kickstarting your creativity and how to succeedKickstarting your creativity and how to succeed
Kickstarting your creativity and how to succeedLauren Chambers
 
10 Ways Your Business Can Boost Social Media
10 Ways Your Business Can Boost Social Media10 Ways Your Business Can Boost Social Media
10 Ways Your Business Can Boost Social MediaJosh Gwin, MBA
 
Publishing: the challenge of delivering exceptional digital user experience
Publishing: the challenge of delivering exceptional digital user experiencePublishing: the challenge of delivering exceptional digital user experience
Publishing: the challenge of delivering exceptional digital user experienceLee Duddell
 
Social Stigma in the Online Dating World
Social Stigma in the Online Dating World Social Stigma in the Online Dating World
Social Stigma in the Online Dating World instabella
 
DotNetNuke - An Excellent Platform For Your Online Presence
DotNetNuke - An Excellent Platform For Your Online PresenceDotNetNuke - An Excellent Platform For Your Online Presence
DotNetNuke - An Excellent Platform For Your Online PresenceMike Taylor
 
Social Media Use and Fulfilling the Need to Belong
Social Media Use and Fulfilling the Need to BelongSocial Media Use and Fulfilling the Need to Belong
Social Media Use and Fulfilling the Need to Belongcapreeca
 
Presentación ITgallery en Summa14
Presentación ITgallery en Summa14Presentación ITgallery en Summa14
Presentación ITgallery en Summa14ITgallery Software
 
Like, Favourite, Retweeet: Social Media's Impact On Our Relationships
Like, Favourite, Retweeet: Social Media's Impact On Our RelationshipsLike, Favourite, Retweeet: Social Media's Impact On Our Relationships
Like, Favourite, Retweeet: Social Media's Impact On Our RelationshipsClement Wong
 
The Top 5 Problems with IR Websites and the Best Practices to Solve Them
The Top 5 Problems with IR Websites and the Best Practices to Solve ThemThe Top 5 Problems with IR Websites and the Best Practices to Solve Them
The Top 5 Problems with IR Websites and the Best Practices to Solve ThemQ4 Web Systems
 
Sutton Group Executive Search
Sutton Group Executive SearchSutton Group Executive Search
Sutton Group Executive SearchKevin Sutton
 

Ähnlich wie How to Avoid the Next STUXNET In Your Control Systems (20)

An Informed World - Awareness Through Social Media
An Informed World - Awareness Through Social MediaAn Informed World - Awareness Through Social Media
An Informed World - Awareness Through Social Media
 
Sacrificed Privacy
Sacrificed PrivacySacrificed Privacy
Sacrificed Privacy
 
Sacrificed Privacy
Sacrificed Privacy Sacrificed Privacy
Sacrificed Privacy
 
Nomophobia; are you addicted to your smartphone?
Nomophobia; are you addicted to your smartphone?Nomophobia; are you addicted to your smartphone?
Nomophobia; are you addicted to your smartphone?
 
CIPD Cov & Warks Branch Event 22 01 2015
CIPD Cov & Warks Branch Event 22 01 2015CIPD Cov & Warks Branch Event 22 01 2015
CIPD Cov & Warks Branch Event 22 01 2015
 
How to Plan For Product Success by CA Technologies VP of Product
 How to Plan For Product Success by CA Technologies VP of Product How to Plan For Product Success by CA Technologies VP of Product
How to Plan For Product Success by CA Technologies VP of Product
 
How on line savvy are you - CIPD Guernsey Event
How on line savvy are you - CIPD Guernsey EventHow on line savvy are you - CIPD Guernsey Event
How on line savvy are you - CIPD Guernsey Event
 
An Informed World - Creating Awareness Through Social Media
An Informed World - Creating Awareness Through Social MediaAn Informed World - Creating Awareness Through Social Media
An Informed World - Creating Awareness Through Social Media
 
Investing Goes Personal: A Look at Crowdfunding in the Digital Age
Investing Goes Personal: A Look at Crowdfunding in the Digital AgeInvesting Goes Personal: A Look at Crowdfunding in the Digital Age
Investing Goes Personal: A Look at Crowdfunding in the Digital Age
 
Sacrificed Privacy
Sacrificed Privacy Sacrificed Privacy
Sacrificed Privacy
 
Kickstarting your creativity and how to succeed
Kickstarting your creativity and how to succeedKickstarting your creativity and how to succeed
Kickstarting your creativity and how to succeed
 
10 Ways Your Business Can Boost Social Media
10 Ways Your Business Can Boost Social Media10 Ways Your Business Can Boost Social Media
10 Ways Your Business Can Boost Social Media
 
Publishing: the challenge of delivering exceptional digital user experience
Publishing: the challenge of delivering exceptional digital user experiencePublishing: the challenge of delivering exceptional digital user experience
Publishing: the challenge of delivering exceptional digital user experience
 
Social Stigma in the Online Dating World
Social Stigma in the Online Dating World Social Stigma in the Online Dating World
Social Stigma in the Online Dating World
 
DotNetNuke - An Excellent Platform For Your Online Presence
DotNetNuke - An Excellent Platform For Your Online PresenceDotNetNuke - An Excellent Platform For Your Online Presence
DotNetNuke - An Excellent Platform For Your Online Presence
 
Social Media Use and Fulfilling the Need to Belong
Social Media Use and Fulfilling the Need to BelongSocial Media Use and Fulfilling the Need to Belong
Social Media Use and Fulfilling the Need to Belong
 
Presentación ITgallery en Summa14
Presentación ITgallery en Summa14Presentación ITgallery en Summa14
Presentación ITgallery en Summa14
 
Like, Favourite, Retweeet: Social Media's Impact On Our Relationships
Like, Favourite, Retweeet: Social Media's Impact On Our RelationshipsLike, Favourite, Retweeet: Social Media's Impact On Our Relationships
Like, Favourite, Retweeet: Social Media's Impact On Our Relationships
 
The Top 5 Problems with IR Websites and the Best Practices to Solve Them
The Top 5 Problems with IR Websites and the Best Practices to Solve ThemThe Top 5 Problems with IR Websites and the Best Practices to Solve Them
The Top 5 Problems with IR Websites and the Best Practices to Solve Them
 
Sutton Group Executive Search
Sutton Group Executive SearchSutton Group Executive Search
Sutton Group Executive Search
 

Mehr von EnergySec

Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseGary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseEnergySec
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsEnergySec
 
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...EnergySec
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyEnergySec
 
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...EnergySec
 
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityDaniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityEnergySec
 
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementLessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementEnergySec
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsEnergySec
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!EnergySec
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network ArchitecturesEnergySec
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleEnergySec
 
Industrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsIndustrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsEnergySec
 
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...EnergySec
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...EnergySec
 
Where Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueWhere Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueEnergySec
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?EnergySec
 
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...EnergySec
 
Industry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherIndustry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherEnergySec
 
What the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherWhat the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherEnergySec
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramEnergySec
 

Mehr von EnergySec (20)

Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseGary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
 
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, Anecdotally
 
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
 
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityDaniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
 
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementLessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWs
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network Architectures
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
 
Industrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsIndustrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With Scissors
 
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
 
Where Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueWhere Cyber Security Meets Operational Value
Where Cyber Security Meets Operational Value
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?
 
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
 
Industry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherIndustry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working Together
 
What the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherWhat the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each Other
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure Program
 

Kürzlich hochgeladen

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 

Kürzlich hochgeladen (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

How to Avoid the Next STUXNET In Your Control Systems

  • 1. Metropolitan Solutions Conference | Security and Reliability for Urban Infrastructures | San Jose, CA | November 6 2012
  • 2. phone: 1-877-267-4732 | web: www.energysec.org | email: info@energysec.org | twitter: @energysec
  • 3. phone: 1-877-267-4732 | web: www.energysec.org | email: info@energysec.org | twitter: @energysec
  • 4. phone: 1-877-267-4732 | web: www.energysec.org | email: info@energysec.org | twitter: @energysec
  • 5. phone: 1-877-267-4732 | web: www.energysec.org | email: info@energysec.org | twitter: @energysec
  • 6. phone: 1-877-267-4732 | web: www.energysec.org | email: info@energysec.org | twitter: @energysec
  • 7. Metropolitan Solutions Conference | San Jose, CA | November 6 2012
  • 8. phone: 1-877-267-4732 | web: www.energysec.org | email: info@energysec.org | twitter: @energysec
  • 9. phone: 1-877-267-4732 | web: www.energysec.org | email: info@energysec.org | twitter: @energysec
  • 10. Credits Presentation by Patrick C Miller, President and CEO, EnergySec, patrick.miller@energysec.org Slide 1 photo by OiMax, creative commons license http://www.flikr.com/photos/72398314@N00 Slide 2 photo by alainv4, creative commons license http://www.flikr.com/photos/12236584@N00 Slide 3 photo by _Geronimo_, creative commons license http://www.flikr.com/photos/90313537@N00 Slide 4 photo by Kitty Terwolbeck, creative commons license http://www.flikr.com/photos/59800091@N04 Slide 5 photo by ShapeThings, creative commons license http://www.flikr.com/photos/84579440@N00 Slide 6 photo by jculverhouse, creative commons license http://www.flikr.com/photos/26615819@N07 Slide 7 photo by nickwheeleroz, creative commons license http://www.flikr.com/photos/7762644@N04 Slide 8 photo by norsez, creative commons license http://www.flikr.com/photos/42918851@N00 Slide 9 photo by Muffet, creative commons license http://www.flikr.com/photos/53133240@N00 Presented at Santa Clara Convention Center, Great American Ballroom, 5001 Great America Pkwy., Santa Clara, CA 95054 Made with HaikuDeck and Microsoft PowerPoint phone: 1-877-267-4732 | web: www.energysec.org | email: info@energysec.org | twitter: @energysec