Join Dragos, SEL and a special guest from a major US energy company, as they discuss the hidden costs behind common cryptographic implementations in OT environments. Only properly implemented crypto can minimize adverse reliability impacts to prevent the expansion of attack surface for potential threat actors. Data authenticity and integrity security controls are vital for cryptographic implementations at Industrial Control System (ICS) infrastructure. While the use of commodity cryptography is an attractive choice, there are many special considerations for ICS environments that need to be addressed when designing the data-in-motion security controls.

Download the PDF of the slides here.

Contact Us for a Demo