How to Monitor Encrypted Communications in OT/IoT Networks

Sponsor Stage

Believe it or not, the age of encrypted OT communications is here. Driven by the increasing influence of IT, where encrypted protocols have existed for a while, various OT groups have created encrypted OT protocols. Furthermore, vendors are starting to implement them in real-world device firmware.

This presentation will combine both research and field expertise to provide a comprehensive look at what’s being done, using IEC 62351 as an example. It will also discuss the security implications of encrypted OT/IoT systems.

Detection & Response Protocols