ISA Pune Section invites you to join the technical webinar on "All you need to know about OT Security"
Friday, June 24, 2022 | 04:00 - 05:00 PM IST
Over a number of years, Operational Technology has evolved from isolated networks based on proprietary technology to standards that connect the OT environments to the rest of the enterprise networks. There are several merits in adopting new technologies, however, while doing do OT environment can be exposed to security threats and vulnerabilities associated with it. It is highly essential to protect the Operational Technology Infrastructure from internal and external threats for smooth and continuous operations
Mr. Amit Musale has contributed to Industrial Cyber Security, Cyber Security for Products in OT/IoT, Embedded Software Development for Networking Products Technology/Security Management for Products in ICS/SCADA, IoT, and Automotive Embedded. He has worked with organizations like Kuwait Oil Company, Deloitte, Emerson Innovation Center and few MNCs during his 20 Yrs of Experience.
• ICS Concepts • ICS Protocols • ICS Malware • ICS Vulnerabilities • ICS Architecture
• ICS Standards • ICS Security Controls • Procurement Language • ISA/IEC 62243 & ISASecure Program • OT Visibility • ICS Honeypots • DIY Lab for Learning/research purpose
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.