Welcome to the interactive agenda for SecurityWeek’s 2019 ICS Cyber Security Conference. Sessions are being finalized and the final program will include 4 FULL DAYS of content. (View the full conference website here) (You can Register for the ICS Cyber Security Conference and training here)
Back To Schedule
Wednesday, October 23 • 2:15pm - 3:00pm
Industrial Control Deception Environments – Levels of Simulation

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Deception environments are systems designed to focus an attacker’s attention, thereby providing early warning of an intrusion, and allowing for analysis of an attacker’s motivations, tools, tactics, and procedures. They are composed of traditional honeypot and honeynet style components, together with other elements such as ‘breadcrumbs’ that are distributed across a real network to entice a potential intruder. Deception environments differ from honeypots in that they are intended to simulate realistic aspects of an organization, and are designed as a defensive campaign.

This presentation introduces analysis into how a deception environment for an industrial control environment can be created. Using the Purdue model for reference it examines the different levels of simulation that can be constructed – simulation of physical processes, control simulation of OT devices, simulation of supervisory systems, and at the highest level the simulation of enterprise systems and even personnel. The analysis examines what is possible at each level, how different levels can be simulated, and discusses which components should be simulated for a particular deception campaign, and how that offers protection against attacks.

Learning Objectives:
  • The benefits of industrial control deception
  • How to create an industrial control deception environment
  • What systems and processes are suitable for simulation
  • How to build an industrial deception campaign

avatar for Dr. Mike Westmacott

Dr. Mike Westmacott

Senior Cyber Security Researcher, Thales
Mike has worked as a technical cyber security analyst for ten years, at boutique security consultancies, and currently at Thales UK where he holds the position of senior cyber security researcher. His current interests and research topics are deception technologies, psychological... Read More →

Wednesday October 23, 2019 2:15pm - 3:00pm EDT
Windsor C