Loading…
Welcome to the Interactive Agenda for SecurityWeek’s 2018 ICS Cyber Security Conference! (View the full conference website here)  (You can Register for ICS Cyber Security Conference Here
View analytic
Tuesday, October 23 • 2:15pm - 3:00pm
Trust No One: Securing 3rd Party Connections to Industrial Control Systems

Sign up or log in to save this to your schedule and see who's attending!

Unfortunately, even as operators work to secure their internal systems, the security of their control systems and devices is only as strong as the security of the 3rd party vendors, suppliers, and outsourced services that have trusted to access to their networks. Recent vulnerability reports across critical infrastructure have revealed that with the increase of these trusted communications networks, remote access, vendors, and supply chains are the most likely routs of ingress for cyber threats. 3rd parties may also have less stringent security policies in place, allowing attackers to more easily infiltrate the operational network, and the controls, equipment, and data stores within. So how can organizations secure 3rd party connections to their operational networks while still benefitting from new industrial control technologies? Through real life case studies and guidance from the DHS, FBI, and NSA, this presentation will analyze the anatomy of attacks through 3rd party connections and outline the best practices and technologies available to help mitigate external threats to ICS systems.

Speakers
avatar for Scott Coleman

Scott Coleman

Director of Product Management, Owl Cyber Defense
Scott Coleman has a strong technical background with 25+ years of experience working in high tech as a programmer, marketing and product manager, and now as Director of Product Management at Owl Cyber Defense. His experience in real-time network solutions covers a number of industries... Read More →


Tuesday October 23, 2018 2:15pm - 3:00pm
TBA