The Necessity of Protecting SCADA Networks
- Understanding where network interdependencies create the most vulnerabilities
- Operating SCADA under the assumption that it is insecure and continuing under this persistent threat
- Using computational intelligence to mend the internet’s underlying insecurity and thus making it safer for SCADA to operate over
Please note: That all fields marked with an asterisk (*) are required.