Industrial Network Cybersecurity Lab Tour
Industrial Network Cybersecurity Lab Tour
Obtained from Web-Resources: Many industrial organizations can be divided into two distinct entities – plant operations and business operations. Plant operations produces goods for consumption whereas business operations manages the financial well being of the organization. Business operations employs traditional information and networking technology to manage daily operations. Plant operations employs operational technology such as sensors, controllers, and final control elements to automate production of consumables. A cyberattack on the plant operations can be much more costly, irreversible, and detrimental to business continuity than a cyberattack on business operations. Hence the need for Industrial Network Cybersecurity. The food we eat and water we drink, the petroleum products that fuel our cars and heat our homes, and the electricity that powers our modern society all rely on industrial control systems. The measurement and control devices that make-up an industrial control system are collectively known as operational technology. Today’s operational technology often employs embedded hardware and operating systems and Ethernet-based networking interfaces that make them susceptible to the same electronic attacks that plagues traditional information technology.
Date and Time
Location
Hosts
Registration
- Date: 18 Oct 2023
- Time: 04:30 PM to 05:30 PM
- All times are (UTC-07:00) Pacific Time (US & Canada)
- Add Event to Calendar
- Contact Event Hosts
- Co-sponsored by BCIT Student Branch and Young Professionals Affinity Group
- Starts 20 September 2023 09:55 AM
- Ends 10 October 2023 09:55 PM
- All times are (UTC-07:00) Pacific Time (US & Canada)
- 3 in-person spaces left!
- No Admission Charge
Speakers
Umme
Introduction to Cybersecurity
This event is a tour of western Canada's first lab dedicated to Cybersecurity. It is held with CISCO Academy at the heart of the foundation.
Biography:
Umme is a faculty member at BCIT and looks after the cybersecurity operations. She is also a CISCO trainer and has had over a decade of experience in teaching computer networks and security courses.
Agenda
4:30 Attendance and Introduction
4:35 Equipment Identification
4:45-5:30 CISCO eNetworks
Limited to 25 Registrants Only