BEGIN:VCALENDAR PRODID:-//Microsoft Corporation//Outlook 16.0 MIMEDIR//EN VERSION:2.0 METHOD:PUBLISH X-MS-OLK-FORCEINSPECTOROPEN:TRUE BEGIN:VTIMEZONE TZID:W. Europe Standard Time BEGIN:STANDARD DTSTART:16011028T030000 RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10 TZOFFSETFROM:+0200 TZOFFSETTO:+0100 END:STANDARD BEGIN:DAYLIGHT DTSTART:16010325T020000 RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3 TZOFFSETFROM:+0100 TZOFFSETTO:+0200 END:DAYLIGHT END:VTIMEZONE BEGIN:VEVENT CLASS:PUBLIC CREATED:20210419T101122Z DESCRIPTION:While IT and OT may have similar aims when it comes to security \, the way they set their priorities is quite different. So how does one g o about harmonizing the risk management approaches of both? One answer\, o utlined in the IEC 62443 standard\, is to segment complex production facil ities and to implement a “Defense-in-Depth” approach.\n \nNote: \n* Da ta privacy: This webinar will be recorded and published. We intend to only record the presentation and voice of the speakers and moderators. Attende es personal data won’t be visible in the recordings afterwards. \n* Acc ess details: This entry in your calendar is only a reminder. Only registe red participants will receive the login information for the web sessions o f our AUVESY Conference. \n Please make sure\, you have registered online !\n \n \n \n DTEND;TZID="W. Europe Standard Time":20210520T101500 DTSTAMP:20210419T101122Z DTSTART;TZID="W. Europe Standard Time":20210520T093000 LAST-MODIFIED:20210419T101122Z PRIORITY:5 SEQUENCE:0 SUMMARY;LANGUAGE=de:OT Security Summit for Automated Industries: Defense in Depth (IEC 62443) TRANSP:OPAQUE UID:040000008200E00074C5B7101A82E008000000007033A5301435D701000000000000000 01000000037B8794CCB66C647B61BC5C13B77BA98 X-ALT-DESC;FMTTYPE=text/html:

While IT and OT may have si milar aims when it comes to security\, the way they set their priorities i s quite different. So how does one go about harmonizing the risk managemen t approaches of both? One answer\, outlined in the IEC 62443 standard\, is to segment complex production facilities and to implement a “\;Defen se-in-Depth”\; approach.

 \ ;

Note:

  • Data privacy: This webinar will be recorded and published. We intend to only record the presentation and voice of the speakers and mode rators. Attendees personal data won’\;t be visible in the recordings afterwards. \;
  • Access details: This entry in your calendar is \; only a reminder. Only reg istered participants will receive the login information for the web sessio ns of our AUVESY Conference.
    Please make sure\, you have registered o nline!

 \;

 \;

 \;

X-MICROSOFT-CDO-BUSYSTATUS:BUSY X-MICROSOFT-CDO-IMPORTANCE:1 X-MICROSOFT-DISALLOW-COUNTER:FALSE X-MS-OLK-CONFTYPE:0 BEGIN:VALARM TRIGGER:-PT15M ACTION:DISPLAY DESCRIPTION:Reminder END:VALARM END:VEVENT END:VCALENDAR