У нас вы можете посмотреть бесплатно The Top 10 OT-Capable Malware: What We’ve Learned and What Comes Next или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Get a free consultation with a unidirectional architect ➡️ https://bit.ly/3HwE1jd An in-depth look at the data behind how OT-capable malware has changed over the last 15 years, what's driving this change and how our defenses should evolve to tackle these threats. In 2024 alone, researchers discovered as many new OT-capable malware families (3) as were found in the previous six years combined—each with the potential to disrupt physical operations in ICS and OT environments. Altogether, in the past 15 years, 10 OT-capable malware were found in the wild. What’s driving this sudden surge? Who’s behind these threats (none of which, by the way, use AI yet)? And how should our defenses evolve to keep pace with these changing threats? Please join us for our for this recorded webinar where we: Look at the data from the ‘Top 10 ICS/OT-Capable Malware’ since 2010 Compare ransomware-grade OT malware with nation-state-grade OT malware Examine the differences between autonomous and remote-control malware Dig deeper into how AI can enable a new wave of autonomous malware in the near future About the Speaker Andrew Ginter is the most widely-read author in the industrial security space, with over 23,000 copies of his three books in print. He is a trusted advisor to the world's most secure industrial enterprises, and contributes regularly to industrial cybersecurity standards and guidance.