This video isn’t available to you right now
Login to check your access and watch the full session.
To redeem an access code, first log in.
- Session
- 11:45
- Duration: 33 mins
- Publication date: 09 Feb 2016
- Location: NA, Savoy Place, Stevenage, United Kingdom
- Part of event Cyber Security for Industrial Control Systems 2016
About the session
Many ICS environments still operate using legacy components and software, which are less secure and more susceptible to an attack. Upgrading is not always feasible in the short-term, meaning that organisations need to take measures to retroactively apply up-to-date security controls to legacy components in order to keep them secure.
Building a picture of the maturity of systems and software: if you can’t upgrade what are your short term options?
Retroactively applying up-to-date security controls to legacy components
Constructing safe and secure systems from untrusted components