Télécommunications

Cyber Security in Operational Technology (OT) for Business Leaders

This webinar was organised and hosted by the Food and Drink Engineering Committee (FDEC) of the IMechE Process Industries Division and promoted across the Division, the Centres in the North West and Yorkshire Regions, the Aberdeen Area, the North East Region and the Midlands, all part of the Process Industries Community.

The food and drink sector is a vital part of the UK economy and is the largest manufacturing sector in the UK, comprising 17% of total UK manufacturing turnover in 2021. Its outputs include primary production such as, flour, yeast and sugar; and secondary production, e.g. bread, dairy, canned foods and drinks, preprepared meals, confectionary, etc. With these outputs it feeds the nation and provides exports.

The nature of the food industry, as both business and as an essential contributor to a country’s food security, means that it can be of interest with those of malevolent intent. Motivations can range from ransom ware to interstate interference to essential infrastructure.

Increasingly cyber security is affecting the Industrial Control Systems (ICS) that sit at the heart of manufacturing processes, sometimes referred to Operational Technology (OT) in addition to the more traditionally targeted Information Technology (IT) systems.

The increasing interconnectivity between IT and OT systems, the growing use of generic communication protocols within OT and an increasing understanding of the vulnerability of OT by those of ill intent is leading to higher levels of concern, within both governments and businesses, about cyber security within OT systems.

This webinar is aimed at senior business leadership and will cover:
• The nature of the cyber security risk
• The differences between IT and OT systems and why they require a related but different approach to cyber security
• A high-level introduction to the international standards affecting this area
• The effects of both UK and EU legislation that will require both end users and integrators to take action
• The types of action to be taken and how this will affect the on-going governance of manufacturing businesses

Views : 37
cyber security

Source by Institution of Mechanical Engineers – IMechE

Mourad ELGORMA

Fondateur de summarynetworks, passionné des nouvelles technologies et des métiers de Réseautique , Master en réseaux et système de télécommunications. ,j’ai affaire à Pascal, Delphi, Java, MATLAB, php …Connaissance du protocole TCP / IP, des applications Ethernet, des WLAN …Planification, installation et dépannage de problèmes de réseau informatique……Installez, configurez et dépannez les périphériques Cisco IOS. Surveillez les performances du réseau et isolez les défaillances du réseau. VLANs, protocoles de routage (RIPv2, EIGRP, OSPF.)…..Manipuler des systèmes embarqués (matériel et logiciel ex: Beaglebone Black)…Linux (Ubuntu, kali, serveur Mandriva Fedora, …). Microsoft (Windows, Windows Server 2003). ……Paquet tracer, GNS3, VMware Workstation, Virtual Box, Filezilla (client / serveur), EasyPhp, serveur Wamp,Le système de gestion WORDPRESS………Installation des caméras de surveillance ( technologie hikvision DVR………..). ,

Laisser un commentaire

Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *