Enhancing Hacker Detection for NERC CIP Compliance While Achieving FERC INSM NOPR Objectives

The hacker community continues to innovate and find creative ways to disrupt critical infrastructure that is becoming more reliant on digital technologies. Volt Typhoon is one example of a sophisticated, stealthy attack targeting real-time operational systems used to manage critical infrastructure operations that must be detected, before it can be used to disable key infrastructure, such as the Electric Grid.

It’s imperative that an entity maintain visibility over communications between networked devices within a trust zone and detect malicious activity that has circumvented perimeter controls. FERC’s INSM NOPR facilitates the detection of anomalous network activity indicative of an attack in progress, thus increasing the probability of early detection and allowing for quicker mitigation and recovery from an attack.

Watch Video

Speakers

 Enhancing Hacker Detection for NERC CIP Compliance While Achieving FERC INSM NOPR Objectives
Videos

Enhancing Hacker Detection for NERC CIP Compliance While Achieving FERC INSM NOPR Objectives

September 27, 2024

The hacker community continues to innovate and find creative ways to disrupt critical infrastructure that is becoming more reliant on digital technologies. Volt Typhoon is one example of a sophisticated, stealthy attack targeting real-time operational systems used to manage critical infrastructure operations that must be detected, before it can be used to disable key infrastructure, such as the Electric Grid.

It’s imperative that an entity maintain visibility over communications between networked devices within a trust zone and detect malicious activity that has circumvented perimeter controls. FERC’s INSM NOPR facilitates the detection of anomalous network activity indicative of an attack in progress, thus increasing the probability of early detection and allowing for quicker mitigation and recovery from an attack.

The hacker community continues to innovate and find creative ways to disrupt critical infrastructure that is becoming more reliant on digital technologies. Volt Typhoon is one example of a sophisticated, stealthy attack targeting real-time operational systems used to manage critical infrastructure operations that must be detected, before it can be used to disable key infrastructure, such as the Electric Grid.

It’s imperative that an entity maintain visibility over communications between networked devices within a trust zone and detect malicious activity that has circumvented perimeter controls. FERC’s INSM NOPR facilitates the detection of anomalous network activity indicative of an attack in progress, thus increasing the probability of early detection and allowing for quicker mitigation and recovery from an attack.

SPEAKERS

The hacker community continues to innovate and find creative ways to disrupt critical infrastructure that is becoming more reliant on digital technologies. Volt Typhoon is one example of a sophisticated, stealthy attack targeting real-time operational systems used to manage critical infrastructure operations that must be detected, before it can be used to disable key infrastructure, such as the Electric Grid.

It’s imperative that an entity maintain visibility over communications between networked devices within a trust zone and detect malicious activity that has circumvented perimeter controls. FERC’s INSM NOPR facilitates the detection of anomalous network activity indicative of an attack in progress, thus increasing the probability of early detection and allowing for quicker mitigation and recovery from an attack.

IN PARTNERSHIP WITH
No items found.
SPEAKERS
Watch More
|
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
Learn more link

Enhancing Hacker Detection for NERC CIP Compliance While Achieving FERC INSM NOPR Objectives

The hacker community continues to innovate and find creative ways to disrupt critical infrastructure that is becoming more reliant on digital technologies. Volt Typhoon is one example of a sophisticated, stealthy attack targeting real-time operational systems used to manage critical infrastructure operations that must be detected, before it can be used to disable key infrastructure, such as the Electric Grid.

It’s imperative that an entity maintain visibility over communications between networked devices within a trust zone and detect malicious activity that has circumvented perimeter controls. FERC’s INSM NOPR facilitates the detection of anomalous network activity indicative of an attack in progress, thus increasing the probability of early detection and allowing for quicker mitigation and recovery from an attack.

Subscribe to our newsletter

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your IoT and OT asset discovery, inventory, and management.