{"id":3551,"date":"2025-08-26T10:57:13","date_gmt":"2025-08-26T08:57:13","guid":{"rendered":"https:\/\/insightevents.dk\/isc-cph\/?post_type=tec_session&#038;p=3551"},"modified":"2025-10-13T14:53:43","modified_gmt":"2025-10-13T12:53:43","slug":"imposing-a-cost-on-the-adversary-not-yourself","status":"publish","type":"tec_session","link":"https:\/\/insightevents.dk\/isc-cph\/sessions\/imposing-a-cost-on-the-adversary-not-yourself\/","title":{"rendered":"Imposing a Cost on the Adversary, not yourself"},"content":{"rendered":"<p><em>Technical Level: Intermediate<\/em><\/p><p>The realization that Critical National Infrastructure is at the point of a Hybrid War is apparent, with the well-publicised outcomes.<br \/>\nHow to deliver an appropriate and proportionate Cyber solution into the Cyber Physical Environment requires careful consideration to ensure the functional integrity of the protected Assets?<br \/>\nThis talk looks at how a Balanced Approach, founded on IEC-62443, has been used to impose a cost on the adversary which is viewed as an operational benefit and not a burden (cost).<br \/>\nDelegates will learn how the foundational requirement of IEC-62443 has been delivered from a Governance Perspective, Operational Perspective whilst driving our Strategic Objective from the project itself.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><em>Technical Level: Intermediate<\/em><\/p>\n<p>The realization that Critical National Infrastructure is at the point of a Hybrid War is apparent, with the well-publicised outcomes.<br \/>\nHow to deliver an appropriate and proportionate Cyber solution into the Cyber Physical Environment requires careful consideration to ensure the functional integrity of the protected Assets?<br \/>\nThis talk looks at how a Balanced Approach, founded on IEC-62443, has been used to impose a cost on the adversary which is viewed as an operational benefit and not a burden (cost).<br \/>\nDelegates will learn how the foundational requirement of IEC-62443 has been delivered from a Governance Perspective, Operational Perspective whilst driving our Strategic Objective from the project itself.<\/p>\n","protected":false},"author":4,"featured_media":0,"template":"","meta":{"inline_featured_image":false,"footnotes":""},"session_track":[7],"session_location":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Imposing a Cost on the Adversary, not yourself - Industrial Security Conference Copenhagen<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/imposing-a-cost-on-the-adversary-not-yourself\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Imposing a Cost on the Adversary, not yourself - Industrial Security Conference Copenhagen\" \/>\n<meta property=\"og:description\" content=\"Technical Level: IntermediateThe realization that Critical National Infrastructure is at the point of a Hybrid War is apparent, with the well-publicised outcomes. How to deliver an appropriate and proportionate Cyber solution into the Cyber Physical Environment requires careful consideration to ensure the functional integrity of the protected Assets? This talk looks at how a Balanced Approach, founded on IEC-62443, has been used to impose a cost on the adversary which is viewed as an operational benefit and not a burden (cost). Delegates will learn how the foundational requirement of IEC-62443 has been delivered from a Governance Perspective, Operational Perspective whilst driving our Strategic Objective from the project itself.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/imposing-a-cost-on-the-adversary-not-yourself\/\" \/>\n<meta property=\"og:site_name\" content=\"Industrial Security Conference Copenhagen\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-13T12:53:43+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/sessions\/imposing-a-cost-on-the-adversary-not-yourself\/\",\"url\":\"https:\/\/insightevents.dk\/isc-cph\/sessions\/imposing-a-cost-on-the-adversary-not-yourself\/\",\"name\":\"Imposing a Cost on the Adversary, not yourself - Industrial Security Conference Copenhagen\",\"isPartOf\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#website\"},\"datePublished\":\"2025-08-26T08:57:13+00:00\",\"dateModified\":\"2025-10-13T12:53:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/sessions\/imposing-a-cost-on-the-adversary-not-yourself\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/insightevents.dk\/isc-cph\/sessions\/imposing-a-cost-on-the-adversary-not-yourself\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/sessions\/imposing-a-cost-on-the-adversary-not-yourself\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/insightevents.dk\/isc-cph\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Imposing a Cost on the Adversary, not yourself\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#website\",\"url\":\"https:\/\/insightevents.dk\/isc-cph\/\",\"name\":\"Industrial Security Conference Copenhagen\",\"description\":\"Industrial Security Conference Copenhagen\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/insightevents.dk\/isc-cph\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Imposing a Cost on the Adversary, not yourself - Industrial Security Conference Copenhagen","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insightevents.dk\/isc-cph\/sessions\/imposing-a-cost-on-the-adversary-not-yourself\/","og_locale":"en_GB","og_type":"article","og_title":"Imposing a Cost on the Adversary, not yourself - Industrial Security Conference Copenhagen","og_description":"Technical Level: IntermediateThe realization that Critical National Infrastructure is at the point of a Hybrid War is apparent, with the well-publicised outcomes. How to deliver an appropriate and proportionate Cyber solution into the Cyber Physical Environment requires careful consideration to ensure the functional integrity of the protected Assets? This talk looks at how a Balanced Approach, founded on IEC-62443, has been used to impose a cost on the adversary which is viewed as an operational benefit and not a burden (cost). Delegates will learn how the foundational requirement of IEC-62443 has been delivered from a Governance Perspective, Operational Perspective whilst driving our Strategic Objective from the project itself.","og_url":"https:\/\/insightevents.dk\/isc-cph\/sessions\/imposing-a-cost-on-the-adversary-not-yourself\/","og_site_name":"Industrial Security Conference Copenhagen","article_modified_time":"2025-10-13T12:53:43+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/insightevents.dk\/isc-cph\/sessions\/imposing-a-cost-on-the-adversary-not-yourself\/","url":"https:\/\/insightevents.dk\/isc-cph\/sessions\/imposing-a-cost-on-the-adversary-not-yourself\/","name":"Imposing a Cost on the Adversary, not yourself - Industrial Security Conference Copenhagen","isPartOf":{"@id":"https:\/\/insightevents.dk\/isc-cph\/#website"},"datePublished":"2025-08-26T08:57:13+00:00","dateModified":"2025-10-13T12:53:43+00:00","breadcrumb":{"@id":"https:\/\/insightevents.dk\/isc-cph\/sessions\/imposing-a-cost-on-the-adversary-not-yourself\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insightevents.dk\/isc-cph\/sessions\/imposing-a-cost-on-the-adversary-not-yourself\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/insightevents.dk\/isc-cph\/sessions\/imposing-a-cost-on-the-adversary-not-yourself\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/insightevents.dk\/isc-cph\/"},{"@type":"ListItem","position":2,"name":"Imposing a Cost on the Adversary, not yourself"}]},{"@type":"WebSite","@id":"https:\/\/insightevents.dk\/isc-cph\/#website","url":"https:\/\/insightevents.dk\/isc-cph\/","name":"Industrial Security Conference Copenhagen","description":"Industrial Security Conference Copenhagen","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insightevents.dk\/isc-cph\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/sessions\/3551"}],"collection":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/sessions"}],"about":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/types\/tec_session"}],"author":[{"embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/users\/4"}],"version-history":[{"count":0,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/sessions\/3551\/revisions"}],"wp:attachment":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/media?parent=3551"}],"wp:term":[{"taxonomy":"tec_track","embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/session_track?post=3551"},{"taxonomy":"tec_location","embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/session_location?post=3551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}