English
  • Russian
  • Korean
  • Support
Positive Technologies
English
  • Russian
  • Korean
  • Solutions
    ICS/SCADA

    Critical infrastructure on the frontline

    Protection from targeted attacks (anti-apt)

    Early detection, rapid investigation

    Security Compliance

    Turn policies into protection

    Vulnerability Management

    Stop being an easy target

    Utilities

    Industrial-grade cybersecurity

    Financial Services

    Can your security keep up with you?

    ERP Security

    Take control of your ERP security

    View all →
  • Products
    MaxPatrol

    Vulnerability and compliance management system.

    PT Application Inspector

    Source code analysis tool.

    PT Sandbox

    Advanced sandbox with customizable virtual environments

    PT MultiScanner

    Multilayered protection against malware attacks.

    MaxPatrol SIEM

    Knows your infrastructure, delivers pinpoint detection.

    PT ISIM

    Cyberthreat detection and incident response in ICS.

    XSpider

    Vulnerability scanner.

    PT Application Firewall

    Intelligent protection of business applications.

    PT Network Attack Discovery

    NDR system to detect attacks on the perimeter and inside the network.

    MaxPatrol SIEM All-in-One

    Full-featured SIEM for mid-sized IT infrastructures

    View all →
  • Services
    ICS/SCADA Security Assessment

    Full Range of ICS-specific Security Services

    Mobile Application Security Services

    Security Analysis and Compliance Audit

    Penetration Testing

    A Comprehensive Approach

    ATM Security Assessments

    Uncover Your Weaknesses

    Custom Application Security Services

    Independent Expert Analysis of Your Source Code

    Forensic Investigation Services

    Prevent Future Incidents

    Web Application Security Services

    Black Box and White Box Analysis

    SSDL Implementation

    Secure Application Development at Your Organization

    Advanced Border Control

    Upgrade Your View of Perimeter Security

    View all →
  • Analytics
    Threatscape
    PT ESC Threat Intelligence
    Cybersecurity glossary
    Knowledge base
    Research Blog
    View all →
  • Partners
    Authorized Partners
    Distributors
    Technology Partners
    View all →
  • About
    Clients
    Press
    News
    Events
    Contacts
    Documents and Materials
    View all →
Menu
  • Home
  • About
  • Events
  • Industrial Cybersecurity Workshops

Industrial Cybersecurity Workshops

Held on July 16-19, 2018
Rome, Milan, Barcelona

Positive Technologies holds a series of Industrial Cybersecurity Workshops in Italy and Spain:

  • Rome, July 16-17
  • Milan, July 18
  • Barcelona, July 19

Industrial control systems are critical to operation of industrial facilities, but poorly protected in terms of information security. Successful attacks against ICS components can cause more than just financial losses. Unauthorized modification or disruption may lead to power blackout, transportation failures, or even major disasters and loss of life.

The aim of this workshop is to bring together integrators and specialists responsible for ICS and SCADA, IT and security, as well as showcase Positive Technology's 15-year experience in industrial security research and our approach to a safer operation.

For registration or questions, please email us

Please note that seats are limited.

Other events

  • Held on December, 15 11:00 GMT The Standoff recap
  • Held on October 23, 2018 Regional Cybersecurity Summit
  • Held on September 13, 2018 Positive Guide to a Successful Signaling Protection Strategy
Share:
Link copied
All events
Solutions
  • ICS/SCADA
  • Vulnerability Management
  • Financial Services
  • Protection from targeted attacks (anti-apt)
  • Utilities
  • ERP Security
  • Security Compliance
Products
  • MaxPatrol
  • MaxPatrol SIEM
  • PT Application Firewall
  • PT Application Inspector
  • PT ISIM
  • PT Network Attack Discovery
  • PT Sandbox
  • XSpider
  • MaxPatrol SIEM All-in-One
  • PT MultiScanner
Services
  • ICS/SCADA Security Assessment
  • ATM Security Assessments
  • Web Application Security Services
  • Mobile Application Security Services
  • Custom Application Security Services
  • SSDL Implementation
  • Penetration Testing
  • Forensic Investigation Services
  • Advanced Border Control
Analytics
  • Threatscape
  • PT ESC Threat Intelligence
  • Cybersecurity glossary
  • Knowledge base
  • Research Blog
Partners
  • Authorized Partners
  • Distributors
  • Technology Partners
About
  • Clients
  • Press
  • News
  • Events
  • Contacts
  • Documents and Materials
Positive Technologies
Copyright © 2002-2021 Positive Technologies
Find us:
  • Terms of Use
  • Privacy Notice
  • Cookie Notice
  • Positive Coordinated Vulnerability Disclosure Policy
  • Sitemap
Copyright © 2002-2021 Positive Technologies
  • Terms of Use
  • Privacy Notice
  • Cookie Notice
  • Positive Coordinated Vulnerability Disclosure Policy
  • Sitemap