680 research outputs found

    Ethics_ How to Discuss Security with Your Clients

    Get PDF
    Meeting proceedings of a seminar by the same name, held February 8, 2022

    Managing law practice technology

    Get PDF
    Presented by Barron K. Henley, at a seminar by the same name, held November 17, 2020

    ETHICS_ Communication Breakdown - It\u27s Always the Same (But it\u27s Avoidable)

    Get PDF
    Meeting proceedings of a seminar by the same name, held February 22, 2022

    Making Technology Work For You

    Get PDF
    Meeting proceedings of a seminar by the same name, held May 5, 2021

    Applying Lessons from Cyber Attacks on Ukrainian Infrastructures to Secure Gateways onto the Industrial Internet of Things

    Get PDF
    Previous generations of safety-related industrial control systems were ‘air gapped’. In other words, process control components including Programmable Logic Controllers (PLCs) and smart sensor/actuators were disconnected and isolated from local or wide area networks. This provided a degree of protection; attackers needed physical access to compromise control systems components. Over time this ‘air gap’ has gradually been eroded. Switches and gateways have subsequently interfaced industrial protocols, including Profibus and Modbus, so that data can be drawn from safety-related Operational Technology into enterprise information systems using TCP/IP. Senior management uses these links to monitor production processes and inform strategic planning. The Industrial Internet of Things represents another step in this evolution – enabling the coordination of physically distributed resources from a centralized location. The growing range and sophistication of these interconnections create additional security concerns for the operation and management of safety-critical systems. This paper uses lessons learned from recent attacks on Ukrainian critical infrastructures to guide a forensic analysis of an IIoT switch. The intention is to identify and mitigate vulnerabilities that would enable similar attacks to be replicated across Europe and North America

    Ethics_ Security is Only as Good as the Weakest Link - Legal Tech Security Measures Every Lawyer Must Take

    Get PDF
    Meeting proceedings of a seminar by the same name, held August 2, 2022

    Legal Technology for Senior Lawyers

    Get PDF
    Meeting proceedings of a seminar by the same name, held October 25, 202
    • …
    corecore