
<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>networks Archives - Industrial Control Systems (ICS) Cybersecurity Conference</title>
	<atom:link href="https://www.icscybersecurityconference.com/tag/networks/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.icscybersecurityconference.com/tag/networks/</link>
	<description>ICS Cybersecurity Conference - Industrial/SCADA Cybersecurity</description>
	<lastBuildDate>Tue, 17 Jan 2017 20:42:59 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.icscybersecurityconference.com/wp-content/uploads/2016/09/favicon.png</url>
	<title>networks Archives - Industrial Control Systems (ICS) Cybersecurity Conference</title>
	<link>https://www.icscybersecurityconference.com/tag/networks/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Exploring Risks of IT Network Breaches to Industrial Control Systems (ICS)</title>
		<link>https://www.icscybersecurityconference.com/critical-infrastructure-security-risks-posed-network-breaches/</link>
					<comments>https://www.icscybersecurityconference.com/critical-infrastructure-security-risks-posed-network-breaches/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Tue, 17 Jan 2017 20:42:59 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[ICS]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[networks]]></category>
		<category><![CDATA[OT]]></category>
		<category><![CDATA[SCADA]]></category>
		<guid isPermaLink="false">http://www.icscybersecurityconference.com/?p=1418</guid>

					<description><![CDATA[<p>(SecurityWeek / Eduard Kovacs) &#8211; There have been several incidents recently where a critical infrastructure organization’s IT systems were breached or became infected with malware. SecurityWeek has reached out to several ICS security experts to find out if these types of attacks are an indicator of a weak security posture, which could lead to control systems also getting hacked. Security incidents involving critical infrastructure organizations There are only a few publicly known examples of cyberattacks targeting an organization’s industrial control systems [&#8230;]</p>
<p>The post <a href="https://www.icscybersecurityconference.com/critical-infrastructure-security-risks-posed-network-breaches/">Exploring Risks of IT Network Breaches to Industrial Control Systems (ICS)</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/critical-infrastructure-security-risks-posed-network-breaches/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
