Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Your ICS Security Strategy: Learn How and Where to Start

August 2013 by Frank Williams, Tofino

Due to a “if it ain’t broke, don’t fix it” mentality, our industry has historically resisted, rather than embraced, emerging technology. Thankfully – and not a moment too soon – experts have started to take advantage of the technologies at their disposal in one key area: security.

As a whole, however, security can be overwhelming. While many managers and engineers know they need to implement some sort of network security measures to protect their operations, they often do not know where to begin. And with that uncertainty (or lack of budget), they may not spring into action unless forced.

At Belden’s upcoming Industrial Ethernet Infrastructure Design Seminar, several of my colleagues and I will be presenting a special “track” related to network security. Our goal is to help event attendees learn where to start with their security strategy, in a practical way that’s not overwhelming or complicated.

In Philadelphia, you’ll have the opportunity to participate in four presentations and one hands-on lab, all facilitated by Belden’s top security experts. While there are plenty of reasons to attend the Design Seminar, you’ll leave with concrete next steps to prioritize and secure your most critical assets.

A hands-on lab at 2012 IEI Design Seminar

Attendees will also learn what they can do to enhance their overall operational security – from policies and procedures and industry best practices, to specific technology, products and solutions that protect mission-critical areas. You’ll even learn how to leverage the products you may already have in place.

The various sessions are designed to complement one another and give you the confidence to go back to your company and know what to do next to secure your network. The sessions include:

• Implementing Network Security – Understand the first steps to take for a layered security approach – perimeter, zone and remote network access. Start with a simple risk assessment.

• Network Security – Securing your Infrastructure Equipment – Learn when and how to apply the security features on existing switches and routers. Make the most of what you already have.

• Network Security – Deep Packet Inspection with the Tofino Firewall – Discover how Deep Packet Inspection provides easy and effective control over who can do what to your automation equipment.

• Adding Secure Remote Access with the EAGLE Firewall – Learn when and how to apply the EAGLE 20 and new EAGLE 30 firewalls for remote access, zone and perimeter security.

• Network Security Lab – Gain hands-on experience, by taking what you’ve learned in the sessions and putting your knowledge to work. You can apply and test popular security products and features for your specific scenario.


See previous articles

    

See next articles












Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts