SlideShare a Scribd company logo
1 of 4
Download to read offline
2/7/2017 Attack on Critical Infrastructure a Serious Cause of Concern: Kaspersky Lab ­ PCQuest
http://www.pcquest.com/attack­on­critical­infrastructure­a­serious­cause­of­concern­kaspersky­lab/ 1/4
Jaspersoft Official Site
BI Software, Reporting & Analytics. Download Jaspersoft Free Trial Now. Go to jaspersoft.com
Jaspersoft Official Site
BI Software, Reporting & Analytics. Download Jaspersoft Free Trial Now. Go to jaspersoft.com
REVIEWS
HyperX CloudX Revolver ‘Gear
War’Gaming Headset Review:
gaming headset with amazing
great comfort!
A comfortable headset can enha
gaming experience without distu
Read more →
Asus Zenfone 3S Max Review:
Battery Phone for Hours of
Uninterrupted Entertainment
Asus fuels the big battery smartp
with its another... Read more →
OPPO F1s Rose Gold Limited E
Valentine’s Day
The camera phone brand, OPPO
up with a... Read more →
K
Attack on Critical Infrastructure a Serious
Cause of Concern: Kaspersky Lab
NEWS SECURITY TRENDS WATCH
ramirocid.com/
0
aspersky Lab held a multi-city press conference focusing on Kaspersky Industrial Cybersecurity Solutions
(KICS). The company brought together its senior team of experts to share their views at the gathering.
In addition to malware and targeted attacks, industrial organizations face a number of threats and risks
targeting people, process, and technology. As we’ve seen in the past, underestimation of these risks could
have serious consequences. Kaspersky Lab has developed a comprehensive portfolio of technologies,
solutions, and services to help our customers tackle and manage many of these risks. Only cyber security
companies that understand the di荔�erences between industrial systems and standard, business-oriented
enterprises are able to deliver security solutions that meet the unique needs of industrial control systems and
industrial infrastructure owners.
In his opening remarks, Vicente Diaz, Principal Security Researcher, Kaspersky Lab Global Research & Analysis
Team said, “In the current APT landscape, India is realizing that they need to keep up with new technologies
and best practices in cyber security, as there are many cyber criminals and nation-sponsored attacks targeting
both companies and governmental organizations perceived as ‘low hanging fruit’ in the eyes of the attackers.”
In his welcome address, Vikram Kalkat, Senior Key Account Manager, Kaspersky Industrial Cyber Security
Global Business Development, APAC Region said, “Operation technology of critical infrastructures should focus
on infrastructure availability of automated systems rather than only data con蒊dentiality. On top of that, in
these cases, business risks should be addressed by the CEO or CFO of a company rather than a CIO.”
Mr. Altaf Halde, Managing Director, Kaspersky Lab – South Asia further added, “We welcome e-governance
initiatives that are entirely supported by technology and it is a result of continuous investments by the IT
companies in the cloud, IoT and the like. As automation technologies such as machine learning and robotics
play an increasingly great role in everyday life, their potential e荔�ect on the workplace has, unsurprisingly,
become a major focus of research and public concern. The discussion tends toward a guessing game: which
jobs will or won’t be replaced by machines?”
by Sidharth Shekhar / January 27, 2017 / 0 comments
Newsletter Search..    Subscription
NEWS & LAUNCHES  REVIEWS  ADVICE  TECH & TRENDS  CASE STUDIES COMMUNITIES  EVENTS  HOT DOWNLOA
2/7/2017 Attack on Critical Infrastructure a Serious Cause of Concern: Kaspersky Lab ­ PCQuest
http://www.pcquest.com/attack­on­critical­infrastructure­a­serious­cause­of­concern­kaspersky­lab/ 2/4
APT KASPERSKY KASPERSKY INDUSTRIAL CYBERSECURITY SOLUTIONS RANSOMWARE
SHARETHISARTICLE
DO THE SHARING THINGY
___
You May Like
ASUS ROG Unveils Strix
GL553 Gaming Notebook
at IGS 2017 - PCQuest
Audio-Technica ATH-SR5
Review: An Expensive Hi-
Res Headphone with…
Media Kit Information -
PCQuest
AXILSPOT Brings its ‘In-
wall AP and Wireless
Bridge’ Series in India -…
PCQuest
Lenovo K6 Note Review:
but Big on Performance
Lenovo, the second-biggest smar
brand in India has launched the..
Read more →
Intex IT – 6050 SUF BT Home T
Review: A great sound beast t
hard rock music!
Intex doesn’t require any introdu
Indian marketplace. The...
»
»
TECH ADVICE
Hey, Carry These Five Desk
Your Pocket
  Desktop PCs vary in price, size a
ability... Read more →
Smartphone Manufacturing
Deserves a Bigger Push: CM
Some of the key highlights of the discussions are as follows:
Global and Local Cyber threats overview
According to KSN data, Kaspersky Lab solutions detected and repelled 171,802,109 malicious attacks from
online resources located in 190 countries all over the world. 45,169,524 unique URLs were recognized as
malicious by web antivirus components. Apart from that, Kaspersky Lab’s web antivirus detected 12,657,673
unique malicious objects: scripts, exploits, executable 蒊les, etc
Attempted infections by malware that aims to steal money via online access to bank accounts were registered
on 1,198,264 user computers. Crypto ransomware attacks were blocked on 821,865 computers of unique
users. A total of 116,469,744 unique malicious and potentially unwanted objects were detected.
Cyber security culture in an ICS/SCADA environment
The modern ICS network infrastructure is insecure by design. It has a long utilization cycle of 15 years or more.
Modern cyber security threats are sophisticated, causing catastrophic damage when penetrating ICS networks.
Energy, oil and gas and critical manufacturing industries are most a荔�ected by cyber security threats and we
learned from a cyber security incident in the Ukraine that a mediocre phishing attack, which started in spring
of 2015, ended up with about 200,000 customers losing power for hours, disabling SCADA automation for
weeks.
Critical infrastructure: a role model to protect normal businesses?
The most important part of every organization towards security is the need to have the right attitude. When
you know that the wrong software update can cause so much damage and losses of thousands of rupees per
minute, you have to alter your approach.
Traditional IT is usually more relaxed, although it is possible to lose anything from $66K (SMBs) to $1,4M
(enterprises) due to downtime from a security incident. Given this, adopting a ‘critical’ attitude when thinking
about IT security seems to be a wise choice.

0

0

0

2

0
NEWS & LAUNCHES  REVIEWS  ADVICE  TECH & TRENDS  CASE STUDIES COMMUNITIES  EVENTS  HOT DOWNLOA
2/7/2017 Attack on Critical Infrastructure a Serious Cause of Concern: Kaspersky Lab ­ PCQuest
http://www.pcquest.com/attack­on­critical­infrastructure­a­serious­cause­of­concern­kaspersky­lab/ 3/4
NOCOMMENTSSOFAR
JUMP INTO A CONVERSATION
No Comments Yet!
You can be the one to start a conversation.
Comment text..
Nickname*
Nickname
E-mail*
E­mail
Website
Website
three × = 12
POST A COMMENT
Your data will be safe!
Your e-mail address will not be published. Also other data will not be shared with third person.

»
»
»
Finance Minister Shri Arun Jaitley
presenting Union Budget for...
10 Reasons Why Buying an
Television Should Not Be T
a Fuss
The market, both o穠ine and mo
is ꊤooded... Read more →
Exclusive Coverage: Inside
Smartphone Test Lab
Before a smartphone is released
undergoes a... Read more →
Microsoft Teams, the Chat-
Collaboration Solution, Lau
Part of Office 365
  Microsoft Teams is a new chat-b
workspace that further...
Posts
Comments
Tags
ADVICE BUYING GUIDES
NEWS NEWS & LAUNCH
SMARTPHONES
TABLETS TECH & TREND
Best 10 smartphon
May 13, 2015
ADVICE LIFE/LIVING
LAUNCHES
TECH EXPLAINED
Is Google’s Brillo fo
big thing in the wo
technology?
May 29, 2015
NEWS & LAUNCHES
ENRG Enters in Indi
OTG USB Drives
RELATEDTECHARTICLES
SIMILAR POSTS FROM TECH CATEGORY
Beyond Anti-spam Tools
June 5, 2003
Tech to Save Time and
Money
April 1, 2009
Windows 10 latest preview
updates for PC and mobile
February 2, 2017
NEWS & LAUNCHES  REVIEWS  ADVICE  TECH & TRENDS  CASE STUDIES COMMUNITIES  EVENTS  HOT DOWNLOA
2/7/2017 Attack on Critical Infrastructure a Serious Cause of Concern: Kaspersky Lab ­ PCQuest
http://www.pcquest.com/attack­on­critical­infrastructure­a­serious­cause­of­concern­kaspersky­lab/ 4/4
»
»
»
»
»
»
»
»
QUICK LINKS
Latest News
News & Launches
Reviews
Tech & Trends
Advice
Communities
Events
Hot Downloads
»
»
»
»
»
»
LINKS
Video
Newsletter
Subscribe
Privacy Policy
Contact Us
Media Kit
»
»
»
»
»
»
»
»
»
BRANDS:
PCQuest
Dataquest
Voice & Data
CIOL
DQ Channels
The DQ Week
Global Services
DARE
Cyber Astro
»
»
»
»
SERVICES:
CyberMedia Research
Content Matrix
CyberMedia Services
TDA Group
»
»
»
»
»
CORPORATE
CyberMedia Hom
About Us
Careers@Cyberm
Privacy Policy
Terms Of Use
© Copyright © 2014. Cyber Media (India) Ltd.
Reproduction in whole or in part in any form or medium without written perm
August 22, 2014
ADVICE BUYING GUIDES
NEWS NEWS & LAUNCH
SMARTPHONES
TABLETS TECH & TREND
Best 10 smartphon
May 13, 2015
SMARTPHONES & TABLET
TRENDS TECH EXPLAINE
EXPLAINED
Hybrids: Set to Rule
2015
February 4, 2015
NOTEBOOKS, PCS & HYBR
SMARTPHONES
TABLETS TABLETS & PH
TRENDS TECH EXPLAINE
Windows 10
December 10, 2014
SMARTPHONES & TA
NEWS & LAUNCHES  REVIEWS  ADVICE  TECH & TRENDS  CASE STUDIES COMMUNITIES  EVENTS  HOT DOWNLOA

More Related Content

What's hot

World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityWorld of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityKeith Redman
 
2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEWSylvain Martinez
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationIBM Security
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
Future of Mobile Web Application and Web App Store
Future of Mobile Web Application and Web App StoreFuture of Mobile Web Application and Web App Store
Future of Mobile Web Application and Web App StoreJonathan Jeon
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
IBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Security
 
The Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control SystemsThe Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control SystemsMuhammad FAHAD
 
Security Redefined - Prevention is the future!!
Security Redefined - Prevention is the future!!Security Redefined - Prevention is the future!!
Security Redefined - Prevention is the future!!Daniel L. Cruz
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityIBM Security
 
SE-4111 Max Berman, User Authentication for Mobile Devices and Access
SE-4111 Max Berman, User Authentication for Mobile Devices and AccessSE-4111 Max Berman, User Authentication for Mobile Devices and Access
SE-4111 Max Berman, User Authentication for Mobile Devices and AccessAMD Developer Central
 
DevTalks 2021 Cloud Engineering @Crowdstrike
DevTalks 2021 Cloud Engineering @CrowdstrikeDevTalks 2021 Cloud Engineering @Crowdstrike
DevTalks 2021 Cloud Engineering @CrowdstrikeCosmin Bratu
 
Astaro Orange Paper Oss Myths Dispelled
Astaro Orange Paper Oss Myths DispelledAstaro Orange Paper Oss Myths Dispelled
Astaro Orange Paper Oss Myths Dispelledlosalamos
 
50+ facts about State of CyberSecurity in 2015
50+ facts about State of CyberSecurity in 201550+ facts about State of CyberSecurity in 2015
50+ facts about State of CyberSecurity in 2015Marcos Ortiz Valmaseda
 
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...ProductNation/iSPIRT
 
Cybersecurity | D-fend: Counter drone solution for urban environments
Cybersecurity | D-fend: Counter drone solution for urban environmentsCybersecurity | D-fend: Counter drone solution for urban environments
Cybersecurity | D-fend: Counter drone solution for urban environmentsVertex Holdings
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityMighty Guides, Inc.
 
5 phases of IoT
5 phases of IoT5 phases of IoT
5 phases of IoTExosite
 
Industrial cyber threat landscape
Industrial cyber threat landscapeIndustrial cyber threat landscape
Industrial cyber threat landscapebayshorenet
 
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasBlack Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasTripwire
 

What's hot (20)

World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityWorld of Watson 2016 - Information Insecurity
World of Watson 2016 - Information Insecurity
 
2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Future of Mobile Web Application and Web App Store
Future of Mobile Web Application and Web App StoreFuture of Mobile Web Application and Web App Store
Future of Mobile Web Application and Web App Store
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
IBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions Roadmap
 
The Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control SystemsThe Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control Systems
 
Security Redefined - Prevention is the future!!
Security Redefined - Prevention is the future!!Security Redefined - Prevention is the future!!
Security Redefined - Prevention is the future!!
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
SE-4111 Max Berman, User Authentication for Mobile Devices and Access
SE-4111 Max Berman, User Authentication for Mobile Devices and AccessSE-4111 Max Berman, User Authentication for Mobile Devices and Access
SE-4111 Max Berman, User Authentication for Mobile Devices and Access
 
DevTalks 2021 Cloud Engineering @Crowdstrike
DevTalks 2021 Cloud Engineering @CrowdstrikeDevTalks 2021 Cloud Engineering @Crowdstrike
DevTalks 2021 Cloud Engineering @Crowdstrike
 
Astaro Orange Paper Oss Myths Dispelled
Astaro Orange Paper Oss Myths DispelledAstaro Orange Paper Oss Myths Dispelled
Astaro Orange Paper Oss Myths Dispelled
 
50+ facts about State of CyberSecurity in 2015
50+ facts about State of CyberSecurity in 201550+ facts about State of CyberSecurity in 2015
50+ facts about State of CyberSecurity in 2015
 
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
 
Cybersecurity | D-fend: Counter drone solution for urban environments
Cybersecurity | D-fend: Counter drone solution for urban environmentsCybersecurity | D-fend: Counter drone solution for urban environments
Cybersecurity | D-fend: Counter drone solution for urban environments
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
 
5 phases of IoT
5 phases of IoT5 phases of IoT
5 phases of IoT
 
Industrial cyber threat landscape
Industrial cyber threat landscapeIndustrial cyber threat landscape
Industrial cyber threat landscape
 
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasBlack Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
 

Viewers also liked

Kaspersky Lab announces specialised cybersecurity solution for industrial sys...
Kaspersky Lab announces specialised cybersecurity solution for industrial sys...Kaspersky Lab announces specialised cybersecurity solution for industrial sys...
Kaspersky Lab announces specialised cybersecurity solution for industrial sys...Vikram Kalkat
 
The Kaspersky Industrial CyberSecurity (KICS) Solution Revealed! - Tech ARP
The Kaspersky Industrial CyberSecurity (KICS) Solution Revealed! - Tech ARPThe Kaspersky Industrial CyberSecurity (KICS) Solution Revealed! - Tech ARP
The Kaspersky Industrial CyberSecurity (KICS) Solution Revealed! - Tech ARPVikram Kalkat
 
Cure laos presentation 2015-2016
Cure  laos presentation 2015-2016Cure  laos presentation 2015-2016
Cure laos presentation 2015-2016IRRI
 
organizaciones inteligentesSlideshare
organizaciones inteligentesSlideshareorganizaciones inteligentesSlideshare
organizaciones inteligentesSlidesharemiguel negreros
 
Estructura atómica de los materiales
Estructura atómica de los materialesEstructura atómica de los materiales
Estructura atómica de los materialesdanagrego
 
Writing Custom Puppet Types and Providers to Manage Web-Based Applications
Writing Custom Puppet Types and Providers to Manage Web-Based ApplicationsWriting Custom Puppet Types and Providers to Manage Web-Based Applications
Writing Custom Puppet Types and Providers to Manage Web-Based ApplicationsTim Cinel
 
The Maya Civilization
The Maya CivilizationThe Maya Civilization
The Maya CivilizationTaz Hasan
 
Expo de fundicion y moldes
Expo de fundicion y moldesExpo de fundicion y moldes
Expo de fundicion y moldesdanagrego
 
北京婚紗攝影
北京婚紗攝影北京婚紗攝影
北京婚紗攝影瓜兒 西
 
Vamos a planificar nuestra alimentación
Vamos a planificar nuestra alimentaciónVamos a planificar nuestra alimentación
Vamos a planificar nuestra alimentaciónSENY FIGUEROA
 

Viewers also liked (20)

Kaspersky Lab announces specialised cybersecurity solution for industrial sys...
Kaspersky Lab announces specialised cybersecurity solution for industrial sys...Kaspersky Lab announces specialised cybersecurity solution for industrial sys...
Kaspersky Lab announces specialised cybersecurity solution for industrial sys...
 
The Kaspersky Industrial CyberSecurity (KICS) Solution Revealed! - Tech ARP
The Kaspersky Industrial CyberSecurity (KICS) Solution Revealed! - Tech ARPThe Kaspersky Industrial CyberSecurity (KICS) Solution Revealed! - Tech ARP
The Kaspersky Industrial CyberSecurity (KICS) Solution Revealed! - Tech ARP
 
PhD Sofie Vandoninck
PhD Sofie VandoninckPhD Sofie Vandoninck
PhD Sofie Vandoninck
 
prayers
prayersprayers
prayers
 
Cure laos presentation 2015-2016
Cure  laos presentation 2015-2016Cure  laos presentation 2015-2016
Cure laos presentation 2015-2016
 
Dropbox
DropboxDropbox
Dropbox
 
app-for-grid
app-for-gridapp-for-grid
app-for-grid
 
Glosario de introduccion al hadware
Glosario de introduccion al hadwareGlosario de introduccion al hadware
Glosario de introduccion al hadware
 
organizaciones inteligentesSlideshare
organizaciones inteligentesSlideshareorganizaciones inteligentesSlideshare
organizaciones inteligentesSlideshare
 
Project2 Fish Box
Project2 Fish BoxProject2 Fish Box
Project2 Fish Box
 
Estructura atómica de los materiales
Estructura atómica de los materialesEstructura atómica de los materiales
Estructura atómica de los materiales
 
Writing Custom Puppet Types and Providers to Manage Web-Based Applications
Writing Custom Puppet Types and Providers to Manage Web-Based ApplicationsWriting Custom Puppet Types and Providers to Manage Web-Based Applications
Writing Custom Puppet Types and Providers to Manage Web-Based Applications
 
The Maya Civilization
The Maya CivilizationThe Maya Civilization
The Maya Civilization
 
Expo de fundicion y moldes
Expo de fundicion y moldesExpo de fundicion y moldes
Expo de fundicion y moldes
 
GUL37_100_BAH_To_See
GUL37_100_BAH_To_SeeGUL37_100_BAH_To_See
GUL37_100_BAH_To_See
 
北京婚紗攝影
北京婚紗攝影北京婚紗攝影
北京婚紗攝影
 
Jclic
JclicJclic
Jclic
 
Bs archicad-10
Bs archicad-10Bs archicad-10
Bs archicad-10
 
Vamos a planificar nuestra alimentación
Vamos a planificar nuestra alimentaciónVamos a planificar nuestra alimentación
Vamos a planificar nuestra alimentación
 
NSS 2016
NSS 2016NSS 2016
NSS 2016
 

Similar to Kaspersky warns of attacks on critical infrastructure

Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksLessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksMighty Guides, Inc.
 
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!DIGITALCONFEX
 
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Black Duck by Synopsys
 
The Hand That Strikes, Also Blocks
The Hand That Strikes, Also BlocksThe Hand That Strikes, Also Blocks
The Hand That Strikes, Also BlocksSaumil Shah
 
OIT Technology, Communications, Japan
OIT Technology, Communications, JapanOIT Technology, Communications, Japan
OIT Technology, Communications, JapanChristos Makiyama
 
Carbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksCarbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksMighty Guides, Inc.
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCase IQ
 
The Next Big Thing in Technology: What innovations will have the biggest impa...
The Next Big Thing in Technology: What innovations will have the biggest impa...The Next Big Thing in Technology: What innovations will have the biggest impa...
The Next Big Thing in Technology: What innovations will have the biggest impa...Career Communications Group
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docxaulasnilda
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9alvin chin
 
Four Tech Trends for 2017
Four Tech Trends for 2017Four Tech Trends for 2017
Four Tech Trends for 2017Peter Pajor
 
Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)
Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)
Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)Callon Campbell
 
Marketplace Innovation Report | Q2, 2016
Marketplace Innovation Report | Q2, 2016Marketplace Innovation Report | Q2, 2016
Marketplace Innovation Report | Q2, 2016Endava
 

Similar to Kaspersky warns of attacks on critical infrastructure (20)

Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksLessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
 
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
 
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
 
Bankinfonews
BankinfonewsBankinfonews
Bankinfonews
 
The Hand That Strikes, Also Blocks
The Hand That Strikes, Also BlocksThe Hand That Strikes, Also Blocks
The Hand That Strikes, Also Blocks
 
OIT Technology, Communications, Japan
OIT Technology, Communications, JapanOIT Technology, Communications, Japan
OIT Technology, Communications, Japan
 
Carbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksCarbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down Attacks
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
 
Women in Technology Leadership
Women in Technology LeadershipWomen in Technology Leadership
Women in Technology Leadership
 
The Next Big Thing in Technology: What innovations will have the biggest impa...
The Next Big Thing in Technology: What innovations will have the biggest impa...The Next Big Thing in Technology: What innovations will have the biggest impa...
The Next Big Thing in Technology: What innovations will have the biggest impa...
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
 
Tech news
Tech newsTech news
Tech news
 
Latest technology news
Latest technology newsLatest technology news
Latest technology news
 
News it varindia
News it varindiaNews it varindia
News it varindia
 
Technology news
Technology newsTechnology news
Technology news
 
The World Has Changed!
The World Has Changed!The World Has Changed!
The World Has Changed!
 
Four Tech Trends for 2017
Four Tech Trends for 2017Four Tech Trends for 2017
Four Tech Trends for 2017
 
Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)
Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)
Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)
 
Marketplace Innovation Report | Q2, 2016
Marketplace Innovation Report | Q2, 2016Marketplace Innovation Report | Q2, 2016
Marketplace Innovation Report | Q2, 2016
 

Kaspersky warns of attacks on critical infrastructure

  • 1. 2/7/2017 Attack on Critical Infrastructure a Serious Cause of Concern: Kaspersky Lab ­ PCQuest http://www.pcquest.com/attack­on­critical­infrastructure­a­serious­cause­of­concern­kaspersky­lab/ 1/4 Jaspersoft Official Site BI Software, Reporting & Analytics. Download Jaspersoft Free Trial Now. Go to jaspersoft.com Jaspersoft Official Site BI Software, Reporting & Analytics. Download Jaspersoft Free Trial Now. Go to jaspersoft.com REVIEWS HyperX CloudX Revolver ‘Gear War’Gaming Headset Review: gaming headset with amazing great comfort! A comfortable headset can enha gaming experience without distu Read more → Asus Zenfone 3S Max Review: Battery Phone for Hours of Uninterrupted Entertainment Asus fuels the big battery smartp with its another... Read more → OPPO F1s Rose Gold Limited E Valentine’s Day The camera phone brand, OPPO up with a... Read more → K Attack on Critical Infrastructure a Serious Cause of Concern: Kaspersky Lab NEWS SECURITY TRENDS WATCH ramirocid.com/ 0 aspersky Lab held a multi-city press conference focusing on Kaspersky Industrial Cybersecurity Solutions (KICS). The company brought together its senior team of experts to share their views at the gathering. In addition to malware and targeted attacks, industrial organizations face a number of threats and risks targeting people, process, and technology. As we’ve seen in the past, underestimation of these risks could have serious consequences. Kaspersky Lab has developed a comprehensive portfolio of technologies, solutions, and services to help our customers tackle and manage many of these risks. Only cyber security companies that understand the di荔�erences between industrial systems and standard, business-oriented enterprises are able to deliver security solutions that meet the unique needs of industrial control systems and industrial infrastructure owners. In his opening remarks, Vicente Diaz, Principal Security Researcher, Kaspersky Lab Global Research & Analysis Team said, “In the current APT landscape, India is realizing that they need to keep up with new technologies and best practices in cyber security, as there are many cyber criminals and nation-sponsored attacks targeting both companies and governmental organizations perceived as ‘low hanging fruit’ in the eyes of the attackers.” In his welcome address, Vikram Kalkat, Senior Key Account Manager, Kaspersky Industrial Cyber Security Global Business Development, APAC Region said, “Operation technology of critical infrastructures should focus on infrastructure availability of automated systems rather than only data con蒊dentiality. On top of that, in these cases, business risks should be addressed by the CEO or CFO of a company rather than a CIO.” Mr. Altaf Halde, Managing Director, Kaspersky Lab – South Asia further added, “We welcome e-governance initiatives that are entirely supported by technology and it is a result of continuous investments by the IT companies in the cloud, IoT and the like. As automation technologies such as machine learning and robotics play an increasingly great role in everyday life, their potential e荔�ect on the workplace has, unsurprisingly, become a major focus of research and public concern. The discussion tends toward a guessing game: which jobs will or won’t be replaced by machines?” by Sidharth Shekhar / January 27, 2017 / 0 comments Newsletter Search..    Subscription NEWS & LAUNCHES  REVIEWS  ADVICE  TECH & TRENDS  CASE STUDIES COMMUNITIES  EVENTS  HOT DOWNLOA
  • 2. 2/7/2017 Attack on Critical Infrastructure a Serious Cause of Concern: Kaspersky Lab ­ PCQuest http://www.pcquest.com/attack­on­critical­infrastructure­a­serious­cause­of­concern­kaspersky­lab/ 2/4 APT KASPERSKY KASPERSKY INDUSTRIAL CYBERSECURITY SOLUTIONS RANSOMWARE SHARETHISARTICLE DO THE SHARING THINGY ___ You May Like ASUS ROG Unveils Strix GL553 Gaming Notebook at IGS 2017 - PCQuest Audio-Technica ATH-SR5 Review: An Expensive Hi- Res Headphone with… Media Kit Information - PCQuest AXILSPOT Brings its ‘In- wall AP and Wireless Bridge’ Series in India -… PCQuest Lenovo K6 Note Review: but Big on Performance Lenovo, the second-biggest smar brand in India has launched the.. Read more → Intex IT – 6050 SUF BT Home T Review: A great sound beast t hard rock music! Intex doesn’t require any introdu Indian marketplace. The... » » TECH ADVICE Hey, Carry These Five Desk Your Pocket   Desktop PCs vary in price, size a ability... Read more → Smartphone Manufacturing Deserves a Bigger Push: CM Some of the key highlights of the discussions are as follows: Global and Local Cyber threats overview According to KSN data, Kaspersky Lab solutions detected and repelled 171,802,109 malicious attacks from online resources located in 190 countries all over the world. 45,169,524 unique URLs were recognized as malicious by web antivirus components. Apart from that, Kaspersky Lab’s web antivirus detected 12,657,673 unique malicious objects: scripts, exploits, executable 蒊les, etc Attempted infections by malware that aims to steal money via online access to bank accounts were registered on 1,198,264 user computers. Crypto ransomware attacks were blocked on 821,865 computers of unique users. A total of 116,469,744 unique malicious and potentially unwanted objects were detected. Cyber security culture in an ICS/SCADA environment The modern ICS network infrastructure is insecure by design. It has a long utilization cycle of 15 years or more. Modern cyber security threats are sophisticated, causing catastrophic damage when penetrating ICS networks. Energy, oil and gas and critical manufacturing industries are most a荔�ected by cyber security threats and we learned from a cyber security incident in the Ukraine that a mediocre phishing attack, which started in spring of 2015, ended up with about 200,000 customers losing power for hours, disabling SCADA automation for weeks. Critical infrastructure: a role model to protect normal businesses? The most important part of every organization towards security is the need to have the right attitude. When you know that the wrong software update can cause so much damage and losses of thousands of rupees per minute, you have to alter your approach. Traditional IT is usually more relaxed, although it is possible to lose anything from $66K (SMBs) to $1,4M (enterprises) due to downtime from a security incident. Given this, adopting a ‘critical’ attitude when thinking about IT security seems to be a wise choice.  0  0  0  2  0 NEWS & LAUNCHES  REVIEWS  ADVICE  TECH & TRENDS  CASE STUDIES COMMUNITIES  EVENTS  HOT DOWNLOA
  • 3. 2/7/2017 Attack on Critical Infrastructure a Serious Cause of Concern: Kaspersky Lab ­ PCQuest http://www.pcquest.com/attack­on­critical­infrastructure­a­serious­cause­of­concern­kaspersky­lab/ 3/4 NOCOMMENTSSOFAR JUMP INTO A CONVERSATION No Comments Yet! You can be the one to start a conversation. Comment text.. Nickname* Nickname E-mail* E­mail Website Website three × = 12 POST A COMMENT Your data will be safe! Your e-mail address will not be published. Also other data will not be shared with third person.  » » » Finance Minister Shri Arun Jaitley presenting Union Budget for... 10 Reasons Why Buying an Television Should Not Be T a Fuss The market, both o穠ine and mo is ꊤooded... Read more → Exclusive Coverage: Inside Smartphone Test Lab Before a smartphone is released undergoes a... Read more → Microsoft Teams, the Chat- Collaboration Solution, Lau Part of Office 365   Microsoft Teams is a new chat-b workspace that further... Posts Comments Tags ADVICE BUYING GUIDES NEWS NEWS & LAUNCH SMARTPHONES TABLETS TECH & TREND Best 10 smartphon May 13, 2015 ADVICE LIFE/LIVING LAUNCHES TECH EXPLAINED Is Google’s Brillo fo big thing in the wo technology? May 29, 2015 NEWS & LAUNCHES ENRG Enters in Indi OTG USB Drives RELATEDTECHARTICLES SIMILAR POSTS FROM TECH CATEGORY Beyond Anti-spam Tools June 5, 2003 Tech to Save Time and Money April 1, 2009 Windows 10 latest preview updates for PC and mobile February 2, 2017 NEWS & LAUNCHES  REVIEWS  ADVICE  TECH & TRENDS  CASE STUDIES COMMUNITIES  EVENTS  HOT DOWNLOA
  • 4. 2/7/2017 Attack on Critical Infrastructure a Serious Cause of Concern: Kaspersky Lab ­ PCQuest http://www.pcquest.com/attack­on­critical­infrastructure­a­serious­cause­of­concern­kaspersky­lab/ 4/4 » » » » » » » » QUICK LINKS Latest News News & Launches Reviews Tech & Trends Advice Communities Events Hot Downloads » » » » » » LINKS Video Newsletter Subscribe Privacy Policy Contact Us Media Kit » » » » » » » » » BRANDS: PCQuest Dataquest Voice & Data CIOL DQ Channels The DQ Week Global Services DARE Cyber Astro » » » » SERVICES: CyberMedia Research Content Matrix CyberMedia Services TDA Group » » » » » CORPORATE CyberMedia Hom About Us Careers@Cyberm Privacy Policy Terms Of Use © Copyright © 2014. Cyber Media (India) Ltd. Reproduction in whole or in part in any form or medium without written perm August 22, 2014 ADVICE BUYING GUIDES NEWS NEWS & LAUNCH SMARTPHONES TABLETS TECH & TREND Best 10 smartphon May 13, 2015 SMARTPHONES & TABLET TRENDS TECH EXPLAINE EXPLAINED Hybrids: Set to Rule 2015 February 4, 2015 NOTEBOOKS, PCS & HYBR SMARTPHONES TABLETS TABLETS & PH TRENDS TECH EXPLAINE Windows 10 December 10, 2014 SMARTPHONES & TA NEWS & LAUNCHES  REVIEWS  ADVICE  TECH & TRENDS  CASE STUDIES COMMUNITIES  EVENTS  HOT DOWNLOA