Loading…
This event has ended. Visit the official site or create your own event on Sched.
Welcome to the Interactive Agenda for SecurityWeek’s 2018 ICS Cyber Security Conference! (View the full conference website here)  (You can Register for ICS Cyber Security Conference Here
View analytic
Monday, October 22 • 9:00am - 5:00pm
Red Team/Blue Team Industrial Cyber Security Training (Full Day - Registration Required)

Sign up or log in to save this to your schedule and see who's attending!

Learn How to Respond to, Adapt, and Defend Against Active Attacks - Full Day Workshop

In order to have an efficient and cost effective risk mitigation strategy, you must understand not only where your vulnerabilities are, but also the tactics that attackers will use to exploit these vulnerabilities. Red Team/Blue Team Training provides the opportunity to learn these adversarial tactics in conjunction with the defensive methods; and then students get to apply the skills they learn as they face off in a head-to-head competition, Blue Team (the defenders) against Red Team (the attackers).

LEO's Red Team/Blue Team training uses cutting edge computer gaming technology developed by the authors of "Hacking Exposed: Industrial Control Systems", to offer all the bet aspects of Red Team/Blue Team training, but in a fraction of the time and without a technical learning curve. Students of all levels can even play part of the Red Team, regardless of experience of skill level.

Students will learn that defending their ICS networks and assets is more than simply deploying "best practices" and "layered defense". By applying the skills they learn against a live opponent who is strategizing against them, they learn how to create targeted defensive strategies and respond to and adapt to active attacks.

What You Will Get Out of This Class:
  • Learn and apply practical industrial cyber security concepts
  • Learn vulnerabilities and attack vectors specific to industrial control systems
  • Learn the methods and strategies hackers use to attack industrial control systems as well as traditional IT systems
  • Learn how to deploy efficient and cost-effective mitigation strategies and security controls
  • Learn how to build a complete cyber security program
  • Apply what you’ve learned against a live adversary using the cutting edge, turn-based computer training simulation/game, ThreatGEN.
  • Learn how to respond to, adapt, and defend against active attacks
  • Participate as the blue team and the red team, regardless of experience or technical skill level

This half-day workshop is available as an option at SecurityWeek’s 2018 ICS Cyber Security Conference - Advanced  Registration is Required.

Speakers
avatar for Clint Bodungen

Clint Bodungen

Vice President, ICS Cyber Security, LEO Cyber Security
Clint is a recognized industrial cybersecurity expert, public speaker, and lead author of the book “Hacking Exposed: Industrial Control Systems”. He has also published dozens of technical papers and training courses on ICS vulnerability assessment, threat research, and risk analysis... Read More →



Monday October 22, 2018 9:00am - 5:00pm
Hope 2 & 3