Join Dune Sookloll from Horizon Power & Wassim Daghash from Illumio, as they discuss the challenges they are experienced over the past 12 months when attempting to minimise breach damange to critical infrastructure, and hear how they have overcome those challenges using different technology and tools to protect themselves from an expanding threatscape.
1. Identify and visualise IT/OT environment connection points
2. Apply Zero Trust controls to stop lateral movement of any breach
3. Quickly and accurately test security policy for internal compliance
With Australia witnessing more high-profile breaches beyond common health and financial verticals, cyber security has been placed on the national agenda in non-traditional targets like critical infrastructure & utilities, mining and logistics. This is witnessed in the recent reforms to the SOCI 2018 Act. One of the key challenge faced across these verticals today is the convergence of OT and IT, essential for competitive advantages, but the combination of greater connectivity and proliferating threat vectors has already resulted in cyber-attacks that have compromised both production and safety.
What differentiates strong security organisations from a weak one in this context is the ability to effectively and proactively take charge of limiting cyber breach damage. In this session, learn how you can manage the complex IT/OT convergence to prevent attackers from taking end-to-end control by: