This event has ended. Visit the official site or create your own event on Sched.
Welcome to the Interactive Agenda for SecurityWeek’s 2017 ICS Cyber Security Conference! (View the full conference website here)  (You can register for the conference here)
View analytic
Monday, October 23 • 4:15pm - 5:00pm
See and Understand Where Your Most Critical Control Systems Are Vulnerable to Cyberattack

Sign up or log in to save this to your schedule and see who's attending!

As we know, industrial and critical infrastructure are becoming a more prevalent attack vector for the modern hacker and cybercriminal. Standard security controls implemented on IT networks often don’t translate or interact with the OT environment. This means that malware or malicious attacks that would be detected through next-generation firewalls, packet inspectors and intrusion prevention systems could slip through into ICS or SCADA networks.

There are also risks and vulnerabilities present in the software and firmware of control system networks; their development methodology and security practices were designed and implemented for a very different security and threat landscape. These aging technologies lack encryption capabilities, data validation principles and other widely used security best practices that have evolved since their implementation.

Added to the innate security shortcomings of industrial networks, the threat landscape is rapidly evolving due to the availability of exploits and other attack tools available on the dark web. Cyberattacks can be quickly and easily launched on a global scale. This means future attacks are going to be faster, more frequent and will impact a much broader front and, to top it off, attackers don’t need advanced skills.

Without visibility of the devices, connections and security posture of your industrial networks, critical attack vectors are slipping through the cracks. Visibility, consistency and continuity are key to understanding and mapping your control systems and integrating them with your IT systems for a complete picture of your attack surface.

In this session, we will discuss key security challenges for industrial networks including:

  • What are the vulnerable and weak security technologies affecting industrial networks and devices
  • Lessons learned from industrial security incidents such as Operation Ghoul and the BlackEnergy-Borne power outage
  • How to bolster industrial network security and gain visibility to the overlap with IT networks

avatar for Michelle Johnson Cobb

Michelle Johnson Cobb

Chief Marketing Officer, Skybox Security
Michelle Johnson Cobb is the chief marketing officer for Skybox Security. She helps to lead the company’s growth in more than 50 countries. For more than 15 years, Cobb has held executive roles in computer security, networking and enterprise software companies, including McAfee... Read More →

Monday October 23, 2017 4:15pm - 5:00pm
Windsor C

Attendees (33)