Cyberharden industrial control systems now or deal with the consequences tomorrow…
In this report, those responsible for the availability, integrity and confidentiality of industrial control systems (ICS) and the security of embedded systems and devices will learn about:
- ICS and embedded system/device vulnerabilities
- How attacks targeting critical infrastructure are launched
- The limitations of ICS and embedded system/device cybersecurity
- How binary randomization and control flow integrity reduce zero-day threats
- How to prevent and mitigate attacks by making every protected system and device functionally identical but logically unique