Incident handling during attack on Critical Information Infrastructure Handbook

In this exercise, the participants should learn to conduct incident handling procedures related to Critical Information Infrastructure (CII) and Supervisory Control and Data Acquisition (SCADA) systems and be prepared to address incidents and overcome obstacles.

We use cookies to ensure we give you the best browsing experience on our website. Find out more on how we use cookies and how you can change your settings.

Ok, I understand No, tell me more