Nation State Attacks on Water – Assess, Understand, Protect
In this hands-on webinar we will demonstrate how an attacker gains access to information of public water systems. We will use tools like Shodan and nmap to detect and assess common vulnerabilities within industrial water systems.
It is easier than ever for threat actors to gather detailed information about you and your water systems using Open Source Intelligence (OSINT) – granting attackers with a list of critical infrastructure systems that are publicly exposed.
More and more incidents seem to be popping up. The Muleshoe, Texas and Aliquippa, Pennsylvania incidents involved hackers gaining unauthorized access to computer systems controlling water infrastructure operations, causing a water tank overflow in Muleshoe and forcing Aliquippa to switch to manual operations. This session will teach you how to protect your water infrastructure with Agilicus AnyX, taking advantage of multi-factor authentication, single sign-on, and privileged access.
View Webinar
Webinar Highlights
Remotely accessing industrial control systems such as SCADA and HMIs can present a number of risks. Particularly when using a port forward or jumpbox without including proper access controls.
The situation gets compounded when your vendors are accessing your systems to perform troubleshooting and maintenance.
After attending this webinar, you’ll understand how to, without changing how you do business, without rethinking the world, without commissioning an IT steering committee to study:
- Assess and Detect Vulnerabilities: Spot the weaknesses in your system using widely available tools like Shodan and nmap
- Implement Secure Connectivity for Partners: Deploy multi-factor authentication, single sign-on, least privilege access, and detailed audit trails to lock down access. No new credentials, no shared passwords.
- Enable Single Sign-On from Multiple Identity Providers Simplify the administrative overhead required to support all your users. Enable secure access for water systems,including external vendors, using their existing email, even on unmanaged devices. Audit per user, not per company.
- Eliminate Risk and Strengthen Cybersecurity: Micro-segment access down to the device level, restricting access to only those that need it to protect your systems and resources. Reduce your attack surface and future-proof your infrastructure.
The Speakers
Don Bowman, CEO at Agilicus
Founder and CEO of Agilicus, Don Bowman is an expert in cloud, security, and networking with 30 years of experience in global Internet, technology, public policy.
LEARN MORE ON THE TOPIC
See how improving your security policies against OSINT with proper access controls and strong password policies can quickly and simply help protect your water infrastructure against nation state threat actors.
Get In Touch
Ready To Learn More?
Agilicus AnyX Zero Trust enables any user, on any device, secure connectivity to any resource they need—without a client or VPN. Whether that resource is a web application, a programmable logic controller, or a building management system, Agilicus can secure it with multi-factor authentication while keeping the user experience simple with single sign-on.
info@agilicus.com, +1 519 953-4332
300-87 King St W, Kitchener, ON, Canada. N2G 1A7
info@partner.com, +1 555 555-5555
1 Main Street, Townsville, ON, Canada. POST-CODE