This content is currently locked.

Your current Info-Tech Research Group subscription does not include access to this content. Contact your account representative gain access to Utilities.

Contact Your Representative
Or Call Us: 1-888-670-8889

Date published:

08/10/2017

There is a lucrative bounty on the backs’ of utility organizations. The evolution of industrial control systems (ICS) has resulted in the emergence of digital automation, data accessibility, and consequently, various vulnerabilities. One successful breach from the wrong attack vector could have devastating repercussions, compromising the integrity of utility infrastructure nation-wide. The need for visibility into the threat landscape is more prominent now than ever; establish a threat intelligence function and improve your organizational situational awareness.
Author:
  • Edward Gray