There are a number of new technologies and techniques designed to secure field equipment. Most of them haven't been implemented in the real world. This presentation covers the techniques likely to be applied by attackers against field equipment and some of the practical solutions being developed.
Live webcast URL option #1 (non-interactive; requires Quicktime)
Live webcast URL option #2 (interactive to support Q&A; no password required)