{"id":4961,"date":"2019-11-28T11:00:38","date_gmt":"2019-11-28T10:00:38","guid":{"rendered":"https:\/\/infrasecforum.pl\/?page_id=4961"},"modified":"2020-09-24T16:20:54","modified_gmt":"2020-09-24T14:20:54","slug":"warsztaty-2020","status":"publish","type":"page","link":"https:\/\/temp.techrisk.pl\/warsztaty-2020\/","title":{"rendered":"Warsztaty 2020"},"content":{"rendered":"[vc_row][vc_column]
Liczba uczestnik\u00f3w na ka\u017cdych warsztatach jest ograniczona do 20 os\u00f3b<\/span>! Decyduje kolejno\u015b\u0107 zg\u0142osze\u0144.\u00a0<\/strong><\/p>\n W warsztatach nie mog\u0105 uczestniczy\u0107 przedstawiciele bran\u017cy ICT oraz firm konsultingowych.<\/strong><\/p>\n <\/p>\n <\/p>\n Airport Hotel, 2 nd floor (1 pi\u0119tro), Discovery boardroom[\/vc_column_text][vc_text_separator title=”Overview” i_icon_fontawesome=”fa fa-pencil-square-o” i_color=”sandy_brown” title_align=”separator_align_left” add_icon=”true”][vc_column_text]Reliable and safe operation of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems are considered critical for a broad range of industries supporting the wellbeing on a national level.<\/p>\n The growing convergence of IT and ICS networks, long-time separated domains, calls for a special attention and adoption of ICS-oriented best practices.<\/p>\n That being said, these functionalities can be jeopardised internally by an incentivised individual, or through remote access by a hostile organization; Hence appropriate preventive measures should be taken to mitigate these breaches and minimize possible damages.[\/vc_column_text][vc_text_separator title=”Target Audience” i_icon_fontawesome=”fa fa-users” i_color=”sandy_brown” title_align=”separator_align_left” add_icon=”true”][vc_column_text]The proposed training workshop is aimed to empower the competency of a wide range of position holders in the SCADA\/ICS arena. Graduates of this course will master the key terms, technologies, and vector activities related to the computerised control which they operate. The training program is suitable for the following groups:<\/p>\nWarsztaty I, 3-4 lutego: SCADA & ICS Cyber Security Workshops*<\/h3>\n
Warsztaty II, 4 lutego: Pasywna identyfikacja atak\u00f3w na infrastruktur\u0119 przemys\u0142ow\u0105 w praktyce<\/h3>\n
*Warsztaty prowadzone w j\u0119zyku angielskim. Organizator nie przwiduje t\u0142umaczenia<\/h6>\n[\/vc_column_text]
SCADA & ICS Cyber Security Workshops<\/h3>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”2\/3″][vc_text_separator title=”Dates” i_icon_fontawesome=”fa fa-calendar-times-o” i_color=”sandy_brown” title_align=”separator_align_left” add_icon=”true”][vc_column_text]Two-days workshops, 3-4 February, 8.30 – 17.30<\/p>\n
\n