Skip to main content
Webinars

Is IT Cryptography the Right Tool for Your OT Network?

Download the webinar slides here.

Join Dragos, SEL, and Duke Energy as they discuss the hidden costs behind common cryptographic implementations in OT environments. Only properly implemented crypto can minimize adverse reliability impacts to prevent the expansion of attack surfaces for potential threat actors. Data authenticity and integrity security controls are vital for cryptographic implementations at Industrial Control System (ICS) infrastructure. While the use of commodity cryptography is an attractive choice, there are many special considerations for ICS environments that need to be addressed when designing the data-in-motion security controls.

You’ll learn about:

  • Positive and negative impacts of cryptography on ICS and the fundamentals of critical infrastructure devices and systems.
  • Recommended metrics for crypto implementations for ICS to maximize the security benefits while minimizing the impact on availability and reliability
  • A practical framework for planning ICS crypto implementations focused on supporting human beings with “plug and play” capabilities while securing long-term automated telemetry and high-speed protection or other automated controls.

Speakers:

  • Josh Carlson, Senior Business Development Manager, Dragos
  • Casey Roberts, Senior Cybersecurity Architect – OT, Duke Energy
  • Colin Gordon, Lead Application Engineer, SEL – Infrastructure Defense
  • Dan Gunter, Director of R&D, Dragos
Discover More Resources Using Keyword Tags
cryptography ICS Cybersecurity OT Cybersecurity

Never miss the latest ICS news and insights from our experts.

 

View the next on-demand webinar

webinars

Improving ICS/OT Visibility and Threat Detection with the Dragos Platform

06.05.20

View more on-demand webinar

Right Arrow

Ready to put your insights into action?

Take the next steps and contact our team today.