Registrations, Networking & refreshment
ICS SOC and the challenges
Importance of Information Sharing and building sector relationships
Threat Intelligence: Is it overhyped?
Deception Technology and ICS environment
Ransomware / Crypto coin Miner: Threat in ICS Environmen
Incident Handling in ICS environment
Panel Discussion: Are we ready to effectively deter, detect and respond to incidents in an ICS environment?
Business Continuity and Resilience in an ICS environment
Closing remarks for Day 1 + Awards
If you Have Any Questions Write Us On firstname.lastname@example.org