BEGIN:VCALENDAR PRODID:-//Microsoft Corporation//Outlook 16.0 MIMEDIR//EN VERSION:2.0 METHOD:PUBLISH X-MS-OLK-FORCEINSPECTOROPEN:TRUE BEGIN:VTIMEZONE TZID:W. Europe Standard Time BEGIN:STANDARD DTSTART:16011028T030000 RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10 TZOFFSETFROM:+0200 TZOFFSETTO:+0100 END:STANDARD BEGIN:DAYLIGHT DTSTART:16010325T020000 RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3 TZOFFSETFROM:+0100 TZOFFSETTO:+0200 END:DAYLIGHT END:VTIMEZONE BEGIN:VEVENT CLASS:PUBLIC CREATED:20210419T101114Z DESCRIPTION:Critical infrastructure operators are adopting new technologies to improve operational efficiencies\, but these changes also add risk. Pr eventative cyber security measures should be implemented when connecting o perational technology to enterprise information technology and Internet of Things (IoT) devices. This session will outline best practices to ensure data is secure and downtime is reduced or avoided altogether.\n \nNote: \n * Data privacy: This webcast will be recorded and published. We intend to only record the presentation and voice of the speakers and moderators. Att endees personal data won’t be visible in the recordings afterwards. \n* Access details: This entry in your calendar is only a reminder. Only reg istered participants will receive the login information for the web sessio ns of our AUVESY Conference. \n Please make sure\, you have registered onl ine !\n \n \n DTEND;TZID="W. Europe Standard Time":20210520T084500 DTSTAMP:20210419T101114Z DTSTART;TZID="W. Europe Standard Time":20210520T080000 LAST-MODIFIED:20210419T101114Z PRIORITY:5 SEQUENCE:0 SUMMARY;LANGUAGE=de:OT Security Summit for Automated Industries: Protecting Critical Infrastructures TRANSP:OPAQUE UID:040000008200E00074C5B7101A82E008000000006086732E1435D701000000000000000 0100000006F4D6E29D35F7E4B928F36275BA2172C X-ALT-DESC;FMTTYPE=text/html:

Critical infrastructure operators are adopting new techno logies to improve operational efficiencies\, but these changes also add ri sk. Preventative cyber security measures should be implemented when connec ting operational technology to enterprise information technology and Inter net of Things (IoT) devices. This session will outline best practices to e nsure data is secure and downtime is reduced or avoided altogether.

 \;

Note:

  • Data privacy: This webc ast will be recorded and published. We intend to only record the presentat ion and voice of the speakers and moderators. Attendees personal data won ’t be visible in the recordings afterwards. \;
  • Acc ess details: This entry in your calendar i s \; only a reminder. Only registered participants will receive the lo gin information for the web sessions of our AUVESY Conference.
    Please make sure\, you have registered online!

&nb sp\;

 \;

X-MICROSOFT-CDO-BUSYSTATUS:BUSY X-MICROSOFT-CDO-IMPORTANCE:1 X-MICROSOFT-DISALLOW-COUNTER:FALSE X-MS-OLK-CONFTYPE:0 BEGIN:VALARM TRIGGER:-PT15M ACTION:DISPLAY DESCRIPTION:Reminder END:VALARM END:VEVENT END:VCALENDAR