

The threats to our critical infrastructure continue to evolve. As new cyberattacks are created and discovered, it is incumbent upon us to evaluate the capabilities of our defensive strategies and technologies against these new offensives.
This session will investigate and report on how the modern, targeted online and removable media threats to industrial cybersecurity fare against the most popular protections deployed to protect critical infrastructure, including: whitelisting, device control, next-gen firewalls, unidirectional gateways, the FLIP, and application data controls.
Presenter(s)
Once the content has been viewed and you have attested to it, you will be able to download and print a certificate for PDH credits.
If you have already viewed this content,
please click here
to login.