When discussing security, there are many critical factors to consider. We all understand that security extends beyond mere prevention, as nothing can ever be 100% safe. It also encompasses our response to breaches, the recovery procedures we have in place, and the forensic methods we use. In the event of a breach, it is essential to remove the source of the attack along with the breach itself. This way, we ensure that upon restarting our systems, they are not re-infected.
This talk will present various use cases, primarily focusing on how we can better prevent intrusions on SCADA networks and conduct efficient and prompt forensics.
Roxana Magdo, Keysight Technologies