Joe Slowik

This webinar provides attendees with the following items:
• An overview of the XENOTIME activity group
• Information on current XENOTIME operations
• Defensive recommendations against SIS attacks

Defensive recommendations focus on measures asset owners and defenders can take immediately to detect, mitigate, and potentially remediate SIS-targeted ICS attacks. Given the absence of specific information on current XENOTIME operations, ICS defenders must work to protect against classes of potential attacks to cover a variety of potential intrusion scenarios.