We kindly invite you to Krones Headquarters for our Cyber Security Workshop.
Meet our experts from the newly established Syskron Security Team. Discuss the challenges of cyber security in the liquid food sector with us and other participants. In lectures and interactive discussions, we not only look at technical aspects, but also at processes and the human factor of cyber security.
You will get answers to questions like:
- What are the biggest threats and risks for production environments?
- Which security measures and trends are feasible?
- What are the key elements of the Krones Cyber Security Strategy?
- Is certification according to ISO 27001 or IEC 62443 useful?
The event is limited to a small number of participants, as we endeavor personal interactions. Moreover, we want to discuss the biggest security challenges with you and your peers. You can also privately address your questions to our security experts and get valuable security tips. We have an open ear to any questions you have.
Technical management, IT & OT security officers, specialists in production engineering, automation, digitalization and IT.
June 18th, 2019
Join our workshop
Participation is free of charge, but the number of participants is limited to 15. We therefore kindly ask for a binding registration. Please let us know if you would like to get recommendations for accommodation. If you cannot attend for any reason, you are welcome to make a pre-registration for the next event without obligation.
Please register by email to:
|08:30 am||Arrival, registration, coffee & tea|
|09:00 am||Start of the event|
Introductory round and expectations of the participants,|
Introduction of Syskron Security
|09:45 am||Keynote speech: Where does the journey "digitalization" take us in the beverage industry?|
|10:15 am||Current threat situation for the liquid food industry. Collection and prioritization of individual threats for the participating companies.|
|11:00 am||Security concepts of the Krones HMI|
Lunch & networking,|
Guided tour through the Krones AG manufacturing plant
From one-time network analysis to continuous SOC monitoring:|
• Core concepts for the ideal network structure of production facilities
• Network Engineer's tools: A detailed network analysis from the perspective of cyber security
• On the way to SOC for production: Continuous monitoring and anomaly detection with dedicated solutions (including demo)
|02:45 pm||Coffee break|
Continuous improvement through management systems:|
Benefits of ISO 27001 and IEC 62443
|03:45 pm||Cyber Security Awareness: The crucial human factor|
|04:15 pm||Final discussion and feedback session|
|05:00 pm||End of the event|