Loading…
Attending this event?
This is a DRAFT Agenda for SecurityWeek’s 2019 ICS Cyber Security Conference. Sessions are being added daily and the final program will include 4 FULL DAYS of content. (View the full conference website here)  (You can Register for ICS Cyber Security Conference Here)
Thursday, October 24 • 2:15pm - 3:00pm
Industrial Control Systems: Comparing Methodologies to Reduce Risk

Sign up or log in to save this to your schedule and see who's attending!

Organizations and professionals are challenged to protect industrial control systems (ICS). Industrial control systems have been and continue to be the target of advanced cyber-attacks. These systems run the infrastructures that power the electric grid, natural gas supply, transportation, and other vital commodities. Cyber-security professionals have enumerated various techniques and methods to protect ICS against cyber-attacks. Despite these protective methods, ICS still suffer from breaches.

This study conducted a deep dive into three of the most advanced ICS cyber-attacks (Stuxnet, TRISYS, BlackEnergy 3)

The tactics of penetration and attack of each cyber-attack were reviewed. The study then examined several of the methods of protection recommended by regulatory and industry professionals. Each of these protection methods was matched against each of the advanced cyber-attacks to establish the efficacy of the method to protect the ICS.

The results of this study found that not all methods of ICS protection worked against advanced ICS cyber-attacks. In addition, there was a noticeable difference of protection among the methods against first-time attacks, when the malware was unknown, versus attacks when the malware was known to the cyber community and steps were taken to defend against the attack.

The study recommended further research into current ICS cyber-attacks. Additional exploration should be done to select and examine other documented methods of protection. Adding further results to the tables in the study will sharpen the determination of the effectiveness of each method against cyber-attacks.


Thursday October 24, 2019 2:15pm - 3:00pm

Attendees (3)