BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.com//bsidesaugusta2023//speaker//D9YZHS
BEGIN:VTIMEZONE
TZID:EST
BEGIN:STANDARD
DTSTART:20001029T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10;UNTIL=20061029T070000Z
TZNAME:EST
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
END:STANDARD
BEGIN:STANDARD
DTSTART:20071104T030000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000402T030000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=4;UNTIL=20060402T080000Z
TZNAME:EDT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
END:DAYLIGHT
BEGIN:DAYLIGHT
DTSTART:20070311T030000
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-bsidesaugusta2023-NFLZU9@pretalx.com
DTSTART;TZID=EST:20231007T133000
DTEND;TZID=EST:20231007T140000
DESCRIPTION:The need for cybersecurity in critical infrastructure environme
 nts (e.g.\, energy pipelines\, power plants\, nuclear facilities\, petroch
 emical sites\, water treatment plants) is at critical levels. In this disc
 ussion\, we’ll be looking at the current state of cybersecurity in these
  types of ICS/OT environments\, including interesting developments in the 
 ICS/OT attack landscape.  We will also look at top ways to secure these sp
 ecialized environments and reduce the risks associated with cyber attacks.
DTSTAMP:20260307T220003Z
LOCATION:Track 4
SUMMARY:How Do We Secure Critical Infrastructure? - Michael Holcomb
URL:https://pretalx.com/bsidesaugusta2023/talk/NFLZU9/
END:VEVENT
END:VCALENDAR
