BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:Australia/Sydney
BEGIN:DAYLIGHT
DTSTART:20201004T030000
TZOFFSETFROM:+1000
TZOFFSETTO:+1100
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=10
TZNAME:AEDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20210404T020000
TZOFFSETFROM:+1100
TZOFFSETTO:+1000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=4
TZNAME:AEST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20220303T035718Z
UID:52F807D4-0A67-43EA-9473-CDD9B69E92C1
DTSTART;TZID=Australia/Sydney:20210325T180000
DTEND;TZID=Australia/Sydney:20210325T193000
DESCRIPTION:Today&#39;s advanced threats from cyber criminals and state-backed 
 organizations have undermined large utilities and critical infrastructures
  around the world. Most recently\, attackers penetrated a Middle Eastern c
 ountry’s water systems and nearly caused thousands of civilians to get s
 ick. The risk is not only to IT systems and data\, but also human lives.\n
 \nOperational Technology (OT) networks in the critical infrastructure mark
 et are evolving\, migrating to IP and Ethernet technology\, deploying more
  security systems\, SCADA and IoT sensors throughout the grid\, and at the
  same time converging Information Technology (IT) platforms into the no lo
 nger fully isolated OT domain\, creating in the process an increase number
  of new vulnerability interfaces to cyber-attacks. Combating cyber threats
  requires an understanding of the anatomy of an attack and must be conside
 red in early stages of any critical infrastructure modernization process.\
 n\nSpeaker(s): Marco Berger\, \n\nVirtual: https://events.vtools.ieee.org/
 m/257165
LOCATION:Virtual: https://events.vtools.ieee.org/m/257165
ORGANIZER:colin.elston@ieee.org
SEQUENCE:10
SUMMARY:JILS - Cyber Security and Critical Infrastructure
URL;VALUE=URI:https://events.vtools.ieee.org/m/257165
X-ALT-DESC:Description: &lt;br /&gt;&lt;p style=&quot;margin-bottom: 0cm\; line-height: 1
 00%\;&quot;&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;p style=&quot;margin-bottom: 0cm\; line-height: 100%\;&quot;&gt;&lt;s
 pan style=&quot;font-family: verdana\, geneva\, sans-serif\; font-size: 12pt\;&quot;
 &gt;&lt;span lang=&quot;en-GB&quot;&gt;Today&#39;s advanced threats from cyber criminals and stat
 e-backed organizations have undermined large utilities and critical infras
 tructures around the world. Most recently\, attackers penetrated a Middle 
 Eastern country&amp;rsquo\;s water systems and nearly caused thousands of civi
 lians to get sick. The risk is not only to IT systems and data\, but also 
 human lives.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;\n&lt;p style=&quot;margin-bottom: 0cm\; line-height
 : 100%\;&quot;&gt;&lt;span style=&quot;font-size: 12pt\; font-family: verdana\, geneva\, s
 ans-serif\;&quot;&gt;&amp;nbsp\;&lt;/span&gt;&lt;/p&gt;\n&lt;p style=&quot;margin-bottom: 0cm\; line-heigh
 t: 100%\;&quot;&gt;&lt;span style=&quot;font-family: verdana\, geneva\, sans-serif\; font-
 size: 12pt\;&quot;&gt;&lt;span lang=&quot;en-US&quot;&gt;Operational Technology (OT) networks in t
 he critical infrastructure market are evolving\, migrating to IP and Ether
 net technology\, deploying more security systems\, SCADA and IoT sensors t
 hroughout the grid\, and at the same time converging Information Technolog
 y (IT) platforms into the no longer fully isolated OT domain\, creating in
  the process an increase number of new vulnerability interfaces to cyber-a
 ttacks. Combating cyber threats requires an understanding of the anatomy o
 f an attack and must be considered in early stages of any critical infrast
 ructure modernization process.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;\n&lt;p style=&quot;margin-top: 0.
 49cm\; margin-bottom: 0.49cm\; line-height: 100%\;&quot;&gt;&lt;span style=&quot;font-size
 : 12pt\; font-family: verdana\, geneva\, sans-serif\;&quot;&gt;&amp;nbsp\;&lt;/span&gt;&lt;/p&gt;
END:VEVENT
END:VCALENDAR

