REPLAY: Case Study - Danish Critical Infrastructure Attack

Details
In May 2023, 22 companies operating parts of the Danish energy infrastructure were compromised in a coordinated attack. Michael Weng will present details of this attack, including the timeline of attack discovery, steps taken in response by defenders, resolution, and the lessons learned from the incident. He will explain the perspective of the Danish CERT, highlighted through the report released in November 2023.
Michael also describes why an OT/ICS NSM solution would not have detected this attack, hence wouldn't have made a significant difference for the defense of the OT/ICS environments.
Click here to REGISTER for the event
-----------------------------------------------------------------------------------------
Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! [[https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)](https://www.cs2ai.org/plans-pricing%5D(https://www.cs2ai.org/plans-pricing))
All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal [[https://www.cs2ai.org/](https://www.cs2ai.org/)](https://www.cs2ai.org/%5D(https://www.cs2ai.org/))
Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.[https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved)](https://www.cs2ai.org/get-involved%5D(https://www.cs2ai.org/get-involved))
*Please note that (CS)²AI Online™ events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on our Zoom Event registration page, all events are open for direct funding support.


Sponsors
REPLAY: Case Study - Danish Critical Infrastructure Attack