Loading…
This event has ended. Visit the official site or create your own event on Sched.
Welcome to the Interactive Agenda for the 2017 Singapore ICS Cyber Security Conference! (View the full Singapore Conference website here)  

Register now to grab a spot at the premier ICS cyber security event for key stakeholders in the APAC region.
View analytic
Wednesday, April 26 • 14:30 - 15:15
Eliminating Security Blind Spots in ICS Environments

Sign up or log in to save this to your schedule and see who's attending!

This talk will skip the standard pitch about why ICS networks are vulnerable and the criticality of operational continuity, and go right to the point, which is to explain how ICS cyber-attacks really operate and where are the security gaps that enable these attacks.

Industrial networks are inherently different than IT networks. In most IT cyber-attack scenarios, the same protocols are used for configuration and production operations. However, in industrial networks, different protocols are used for different types of operations. The builders of Stuxnet understood this more than 5 years ago, yet most security specialists still don’t fully understand the difference.

In this session we will discuss: 

  • The need to monitor the proprietary network protocols and track all changes to the controllers
  • Why changes to PLC code blocks are transparent to “standard” OT protocol inspections (i.e. MODBUS/DNP3/ICCP) and what should be monitored
  • Which additional security gaps must be addressed in order to protect ICS networks against cyber-attacks, malicious insiders and human errors

Join us for this myth-busting session in which we will dispel common fables around industrial cyber-attacks and explain how they really operate.

Session attendees will:

  • Gain insight into real-world threats to ICS networks and understand how ICS cyber attacks are really executed
  • Review how attackers can compromise critical industrial controllers (PLCs, RTUs) while remaining undetected
  • Understand the proprietary OT network protocols used by vendors to manage industrial controllers, their strengths and weaknesses
  • Learn about best-practices that should be implemented to secure OT networks and industrial controllers

Speakers
avatar for Mille Gandelsman

Mille Gandelsman

CTO and Co-Founder, Indegy
Mille Gandelsman is the CTO and Co-Founder of Indegy, an industrial cybersecurity startup that provides situational awareness and real-time security for industrial control networks. He leads Indegy’s technology research and product management activities. Prior to Indegy, Gandelsman led engineering efforts for Stratoscale and spen... Read More →


Wednesday April 26, 2017 14:30 - 15:15
Moor Room 4th Floor

Attendees (5)