In the last 35 years, the security of IT and OT systems is a growing area of concerns. Beyond the risks caused by computer viruses, worms or trojans, the concerning trends of the last 10 years - Distributed Denial Of Service attack (DDoS) / Data leak / - Data manipulation resp. destruction / - Ransomware - are related to attacks of IT and OT systems as well as the related infrastructure.
Beside the necessary IT security elements which shall be enforced at the highest level of the organisation, including IT department, the OT systems must be accurately protected, securing business capability and business continuity.
This webinar is aimed at employees from the pharmaceutical industry, hospitals and IT and engineering service providers. It addresses the areas of IT, engineering, production or facility management, QA and QC.
For our webinars, we use Cisco WebEx, one of the leading suppliers of online meetings. At https://www.webex.com/test-meeting.html
you can check if your system meets the necessary requirements for the participation at a WebEx meeting and at the same time install the necessary plug-in. Please just enter your name and email address for the test. If the installation is not possible because of your rights for the computer system, please contact your IT department. WebEx is a standard nowadays and the necessary installation is fast and easy.
This webinar is focused on OT infrastructure and OT systems, such as : automation systems, process control systems, laboratory equipment, facility management systems.
The lifetime expectation of OT systems is usually much longer than for classical IT systems. Such long lifetime represents some challenges in particular regarding the operation of out-of-support systems respectively of still supported systems being nevertheless not compliant with current operating system or middleware versions.
This webinar covers the following topics:
- Definition of IT and OT systems
- Cybersecurity reality
- Software supply chain attacks
- Design of robust OT infrastructure
- Backup and restore considerations