Cyber Security 

JULY FEATURED PRODUCTS

view all

RESOURCES

in Cyber Security
  • InfinityQS publishes book debunking Cloud Computing Myths

    Free eBook combats cloud computing fiction with fact, and encourages quality and IT professionals to consider cloud-based tools as a solution for... MORE

  • Green Hills Software Announces Security Advisors Program

    IoT Security Advisors will provide security services for organizations that must manage privacy and security challenges associated with the IoT. MORE

  • Siemens Introduces Managed Security Service

    Service includes assessment of security posture, implementation of recommended security measures and transitions into ongoing defense against cyber... MORE

  • view all

    WHITE PAPERS

    in Cyber Security
  • Securing Industrial Embedded devices 
    Securing Industrial Embedded devices

    By Mahesh Subrmaniam, HCL
    Paper provides an overview of cyber security standards, procedures and design considerations to be made during embedded... MORE

  • Windows XP End of Service: Practical Options for Industrial Applications 
    Windows XP End of Service: Practical Options for...

    By Belden
    Windows XP could be everywhere in your plant: in PCs, HMIs, and hundreds of embedded devices used for process control and automation.... MORE

  • Leveraging OPC UA to Help Meet Site Security Requirements 
    Leveraging OPC UA to Help Meet Site Security Requirements

    By Tony Paine, Kepware
    Data has to be transmitted over public domains securely in order to protect the authenticity, integrity, and... MORE

  • view all

    CASE STUDIES

    in Cyber Security
  • Multivac uses remote service to keep packaging machines running 
    Multivac uses remote service to keep packaging machines...

    Multivac packaging machines work in multi-shift operation up to seven days a week. Diagnostic data requested via remote service provides insight... MORE

  • Network Management Put to the Test 
    Network Management Put to the Test

    Automation World
    The largest control network built in one phase in the Middle East is for the Qatalum aluminum smelter plant. Managing the more... MORE

  • Remote machine diagnostics and support 
    Remote machine diagnostics and support

    MAC Solutions uses an eWON Talk2M Virtual Private Network router to provide remote diagnostics with good security. MORE

  • view all

    EVENTS

    in Cyber Security
    July 1, 2013 - June 30, 2015
    Online , KS, USA


    This course is intended to provide an understanding of the types of computer-based devices, systems and networks used in modern industrial plants as well as the ways in which these elements can be compromised via cyber attacks. Attendees will also learn to build risk management techniques to improve their plant’s cybersecurity.

    July 28, 2014 - July 30, 2014
    Atlanta , GA, United States


    The marcus evans 6th NERC Compliance Conference will address major issues such as CIP standards demonstrating the difficulties of legislating reliability and security, culture of compliance, audit preparation, transparency between regional entities, and federal legislative and regulatory concerns.

    September 8, 2014 - September 13, 2014
    Chicago , IL, USA


    From robotics and automation services, to micro sensors and nanotechnology, Industrial Automation North America showcases the most important products in the industry and is the North American hub for innovation and networking in industrial automation.

    view all

    TRAINING

    in Cyber Security
    September 3, 2014 - September 5, 2014
    Kansas City , MO, USA


    New this year with a Version 5 Foundations Course and a 2-day Deep Dive Course. The Foundation Course is perfect for both seasoned NERC CIP professionals seeking to ensure a smooth transition to version 5, as well as those new to NERC CIP who wish to jump start the learning process on these important standards. In the 2-day Deep Dive Course attendees will come away with detailed knowledge of...