Trusted Computing Group’s approach to addressing Industrial Cybersecurity
Today, cyberattacks on industrial systems are no longer a theoretical problem and are resulting in massive disruptions and risks to operations and to safety. For cybersecurity attack prevention and risk minimization on industrial control systems (ICS) Trusted Computing can play a critical role by providing protections against exploitation of software vulnerabilities and even against physical attacks, as functional safety cannot be ensured unless the system is secure.
Because of the irresistible change to an Industrial IoT (IIoT) and the fact that IT Security is not equal to ICS Security, we need to figure out suitable countermeasures and set future-proof standards for addressing Industrial Cybersecurity.
Facing the different security challenges of industrial control systems, the session will explain how Trusted Computing can be used to implement typical use cases for securing those systems. Moreover, it will create a better understanding of industrial security uses of Trusted Computing technology.