Welcome to the interactive agenda for SecurityWeek’s 2019 ICS Cyber Security Conference. Sessions are being finalized and the final program will include 4 FULL DAYS of content. (View the full conference website here) (You can Register for the ICS Cyber Security Conference and training here)
Back To Schedule
Tuesday, October 22 • 2:15pm - 3:00pm
SCADA Device Exploitation and Attack Mitigation Techniques

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

It's not news that SCADA vendors still have gaping holes in their PLC and HMI development environments.

Research into 7 different PLC vendor software systems details an almost negligent lack of security standards in modern SCADA environments. This lack of security creates great opportunity for future attackers and the next high-profile attack on industrial control systems.

The attack scenario cannot be understated as critical systems such as power, water, transportation, and manufacturing. all rely on major PLC vendors in one way or another. This session will show a theoretical attack that could have happened using recently discovered vulnerabilities and proof of concept code to disrupt a major power industrial system.

Joseph Bingham will share observations on vulnerabilities found in vendors across the board and mitigation techniques for using these required software in highly critical environments where even air-gapping is not enough to remove the threat of a remote attacker.

Learning Objectives
  • SCADA systems are extremely critical and their security needs to be considered much more highly in the future.
  • Some vendors are more reliable than others for a secure environment.
  • Demonstration of actual SCADA attack, practical attack vectors
  • Mitigation techniques for existing SCADA environments.

avatar for Joseph Bingham

Joseph Bingham

Senior Research Engineer, Zero Day Research, Tenable
Before joining Tenable in 2014, Joseph worked at Symantec doing malware reverse engineering. Since joining Tenable as a reverse engineer, Joseph has produced several publications on malware, exploitation and reverse engineering.

Tuesday October 22, 2019 2:15pm - 3:00pm EDT
Windsor C