Critical infrastructure

Hackers work digitally. Nonetheless, they are capable of physically damaging critical infrastructure through cyber attacks. This infrastructure is controlled by SCADA or ICS systems and connected to the internet through computer networks.

A malicious intruder could, for example, deliberately open locks and bridges, toggle railroad switches, or make the instruments in a (nuclear) power plant display incorrect readings. Although the risk of this actually happening in the Netherlands is quite low, the possibility alone is enough to test for and secure against it.

ICS SCADA Webinar

Watch the recording of our ICS SCADA  webinar. This webinar will aim to provide an overview of ICS security by reviewing several important lessons learned. Experts Razvan Venter and Jos Wetzels, will adress the threats, risks, state-of-the-art security practices and relevant standards related to critical infrastructure. More information.

Watch the webinar Assessing & Protecting Critical Infrastructure

@ Secura 2019
Webdesign Studio HB / webdevelopment Medusa