BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
DTSTART:20230312T030000
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:PDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20231105T010000
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:PST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20231019T005656Z
UID:B5BD7F83-9061-4495-A182-D99032522B4D
DTSTART;TZID=America/Los_Angeles:20231018T163000
DTEND;TZID=America/Los_Angeles:20231018T173000
DESCRIPTION:Obtained from Web-Resources: Many industrial organizations can 
 be divided into two distinct entities – plant operations and business op
 erations. Plant operations produces goods for consumption whereas business
  operations manages the financial well being of the organization. Business
  operations employs traditional information and networking technology to m
 anage daily operations. Plant operations employs operational technology su
 ch as sensors\, controllers\, and final control elements to automate produ
 ction of consumables. A cyberattack on the plant operations can be much mo
 re costly\, irreversible\, and detrimental to business continuity than a c
 yberattack on business operations. Hence the need for Industrial Network C
 ybersecurity. The food we eat and water we drink\, the petroleum products 
 that fuel our cars and heat our homes\, and the electricity that powers ou
 r modern society all rely on industrial control systems. The measurement a
 nd control devices that make-up an industrial control system are collectiv
 ely known as operational technology. Today’s operational technology ofte
 n employs embedded hardware and operating systems and Ethernet-based netwo
 rking interfaces that make them susceptible to the same electronic attacks
  that plagues traditional information technology.\n\nCo-sponsored by: BCIT
  Student Branch and Young Professionals Affinity Group\n\nSpeaker(s): Umme
 \, \n\nAgenda: \n4:30 Attendance and Introduction\n\n4:35 Equipment Identi
 fication\n\n4:45-5:30 CISCO eNetworks\n\nRoom: 3550\, Bldg: SW01\, 3700 Wi
 llingdon Avenue\, Burnaby\, British Columbia\, Canada\, V5G 3H2
LOCATION:Room: 3550\, Bldg: SW01\, 3700 Willingdon Avenue\, Burnaby\, Briti
 sh Columbia\, Canada\, V5G 3H2
ORGANIZER:bgill@ieee.org
SEQUENCE:37
SUMMARY:Industrial Network Cybersecurity Lab Tour
URL;VALUE=URI:https://events.vtools.ieee.org/m/374691
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;Obtained from Web-Resources: Many industri
 al organizations can be divided into two distinct entities &amp;ndash\; plant 
 operations and business operations. Plant operations produces goods for co
 nsumption whereas business operations manages the financial well being of 
 the organization. Business operations employs traditional information and 
 networking technology to manage daily operations. Plant operations employs
  operational technology such as sensors\, controllers\, and final control 
 elements to automate production of consumables. A cyberattack on the plant
  operations can be much more costly\, irreversible\, and detrimental to bu
 siness continuity than a cyberattack on business operations. Hence the nee
 d for Industrial Network Cybersecurity. The food we eat and water we drink
 \, the petroleum products that fuel our cars and heat our homes\, and the 
 electricity that powers our modern society all rely on industrial control 
 systems. The measurement and control devices that make-up an industrial co
 ntrol system are collectively known as operational technology. Today&amp;rsquo
 \;s operational technology often employs embedded hardware and operating s
 ystems and Ethernet-based networking interfaces that make them susceptible
  to the same electronic attacks that plagues traditional information techn
 ology.&amp;nbsp\;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;Agenda: &lt;br /&gt;&lt;p&gt;4:30 Attendance and Introduc
 tion&lt;/p&gt;\n&lt;p&gt;4:35 Equipment Identification&lt;/p&gt;\n&lt;p&gt;4:45-5:30 CISCO eNetwor
 ks&lt;/p&gt;\n&lt;p&gt;&amp;nbsp\;&lt;/p&gt;
END:VEVENT
END:VCALENDAR

