Hi [[ session.user.profile.firstName ]]
Sort by:
    • The real cybersecurity risks for SCADA and ICS networks
      The real cybersecurity risks for SCADA and ICS networks Palo Alto Network Senior Industry Expert in SCADA/ICS Networks Recorded: May 18 2016 2:00 am UTC 44 mins
    • It has been well known for some time now that cyber threats to critical national infrastructure has been escalating with many attacks making headline news.

      Normal information assurance approaches used in the corporate environment may not be suitable for your critical infrastructure systems.

      We understand the cybersecurity challenges you are facing today, and believe utilising a platform approach can effectively protect your key infrastructure by:

      •Gaining granular visibility over operational network traffic
      •Segmenting networks with access controls while meeting performance requirements
      •Protecting unpatched commercial-off-the shelf (COTS) systems
      •Preventing advanced cyber attacks which utilise ‘Zero Day’ methods

      Read more >
    • The real cybersecurity risks for SCADA and ICS networks
      The real cybersecurity risks for SCADA and ICS networks Palo Alto Network Senior Industry Expert in SCADA/ICS Networks Recorded: May 18 2016 9:01 am UTC 44 mins
    • It has been well known for some time now that cyber threats to critical national infrastructure has been escalating with many attacks making headline news.

      Normal information assurance approaches used in the corporate environment may not be suitable for your critical infrastructure systems.

      We understand the cybersecurity challenges you are facing today, and believe utilising a platform approach can effectively protect your key infrastructure by:

      •Gaining granular visibility over operational network traffic
      •Segmenting networks with access controls while meeting performance requirements
      •Protecting unpatched commercial-off-the shelf (COTS) systems
      •Preventing advanced cyber attacks which utilise ‘Zero Day’ methods

      Read more >
    • Securing ICS/SCADA Networks
      Securing ICS/SCADA Networks Ronen Shpirer, Security Solutions Architect, Fortinet Recorded: May 17 2016 9:00 am UTC 48 mins
    • Automation is at the base of many industries and Supervisory Control And Data Acquisition (SCADA) is the base architecture enabling interactive automation of the industrial environment. The industrial environment has been going through rapid innovation, moving from isolated legacy systems to IP based, interconnected systems. In recent years, the Industrial Control Systems (ICS) upon which much of our critical infrastructure and manufacturing industry depends, have come under increasingly frequent and sophisticated cyber-attacks.

      Join Fortinet to learn more about the ICS/SCADA specific environment, its security challenges and Fortinet’s unique solutions for the industrial environment.

      Read more >
    • Exposing Common Myths Around Cyberthreats to SCADA and ICS
      Exposing Common Myths Around Cyberthreats to SCADA and ICS Joe Weiss, Applied Control Solutions and Managing Director for ISA99; Del Rodillas of Palo Alto Networks Recorded: Jan 7 2015 6:00 pm UTC 45 mins
    • While awareness over the need for improved cybersecurity in SCADA and Industrial Control Systems (ICS) has improved in recent years, several inaccurate and dangerous assumptions about ICS cybersecurity best practices and the nature of cyber threats still persist. If held by organizations as fact, these myths could result in inadequate cyber-defensive measures and a high level of exposure to a range of attacks or even simple accidental cyber incidents both of which could have equally concerning consequences to process availability and safety.

      Join ICS cybersecurity experts, Joe Weiss and Del Rodillas, to learn about:

      - Common myths around cyberthreats to ICS and why they could be significant security gaps when held as truth
      - Select real-world examples that highlight the consequences when malicious actors successfully exploit these gaps
      - The more updated and accurate view to ICS cyberthreats as well as effective technologies which help asset owners build a stronger ICS security posture

      Presenters:
      Joe Weiss, Managing Partner of Applied Control Solutions, Managing Director for ISA99

      Del Rodillas, Sr. Manager for SCADA and Industrial Control Systems Initiative at Palo Alto Networks

      Read more >
    • SCADA Security: Why is it so hard?
      SCADA Security: Why is it so hard? Amol Sarwate Recorded: Feb 27 2012 6:00 pm UTC 60 mins
    • SCADA security and advance persistent threats have now taken center stage. While the industry has some success in dealing with IT security, when it comes to industrial control systems or SCADA systems, we still have enormous challenges. This session will discuss why implementing SCADA security is so difficult, and discuss strategies to meet these challenges. I will discuss my experience working with large organizations with control system installations, and present how SCADA security can be deciphered.

      The session will include:
      - A very brief technical introduction to SCADA and industrial control systems
      - SCADA systems under the hood, including SCADA protocols like MODBUS and DNP3 at the packet level
      - Attacks on RTU, PLC, HMI, FEP, SCADA slaves and master stations
      - Real world examples of successful and not-so-successful implementations of securing control systems and SCADA systems.
      - How to use security tools, technical solutions and a change in mindset to address SCADA security
      - Pointers on using the free open-source SCADA scanning tool

      This presentation will help organizations trying to implement security measures for their controls systems and SCADA systems. It identifies hurdles that organizations face and will help avoid them, from mistakes made by others. It will help attended try out some tools and techniques when they get back from the conference. It will also help security vendors as well as vendors of SCADA systems to align their solutions to achieve a common goal. For attendees who are not familiar with in-depth SCADA security, the presentation will be an excellent introduction and fast forward to effective SCADA security implementation.

      Read more >
    • From SCADA and ICS to the Internet of Things
      From SCADA and ICS to the Internet of Things Andy Swift, CNS Group Recorded: Aug 11 2016 1:00 pm UTC 48 mins
    • Whether you refer to them as Supervisory Control and Data Acquisition, Industrial Control Systems, Machine Interface, Remote Terminal Unit, Programmable Logic Controller, Internet of Things - these systems underpin many of the manufacturing processes that make modern day life possible from water treatment, steel mills, nuclear power stations, elevator shafts, cars, trains to planes.

      Yet, when compared with other more common networking protocols, they are often considered “basic”. However the risks and results of compromise are far more grave than other more protected systems.

      Testing such system requires specialist skills but that doesn’t mean it’s any more expensive or inaccessible than testing any other system. Learn in this presentation:

      - How systems should be tested
      - How to conduct relevant risk analysis
      - What can happen if an attack takes place
      - How some of the most widely reported attacks happened
      - What you can do to avoid breach

      Read more >
    • Securing Critical Infrastructure with Advanced Cybersecurity Controls
      Securing Critical Infrastructure with Advanced Cybersecurity Controls Keao Caindec, VP of Marketing and Dean Weber, CTO, Mocana Recorded: Aug 1 2017 6:00 pm UTC 46 mins
    • The US Department of Homeland Security has defined 16 critical infrastructure sectors, including: chemical, communications, critical manufacturing, dams, defense, energy, financial, food and agriculture, healthcare, IT, nuclear, transportation and water and waste management.

      Securing the industrial control systems (ICS) and SCADA networks requires a different approach that goes beyond threat detection, perimeter-based security, firewalls and physical security protections.

      In this webinar, you’ll learn about how to architect and embed strong cybersecurity controls such as: secure boot, multi-factor authentication, secure software updates, secure communications between industrial devices (PLCs, sensors, IEDs, RTUs and controllers), gateways and industrial clouds. You’ll also learn about how to enable applications to call cryptographic functions that leverage hardware secure elements such as TPM, SGX, TrustZone as well as HSMs and SIMs.

      Read more >
    • Protecting the ICS through Segmentation
      Protecting the ICS through Segmentation Lionel Jacobs - Sr. Architect, Industrial Controls Systems - Palo Alto Networks Recorded: Oct 19 2016 6:00 pm UTC 50 mins
    • Segmentation is a crucial element to modern network design and accepted widely as a recommended best practice. It is believed that many of the current successful cyber-attacks against ICS/SCADA infrastructures could have been prevented or contained if proper segmentation had been in place.

      Unfortunately, many existing ICS/SCADA systems predate modern best practices. Owner-operators are challenged to face cybersecurity risks with outdated defense mechanisms. Implemented during an era where air gaps existed, the use of commercially available off-the-shelf products (COTS) have connected the serial based on brownfield systems into the industrial Internet of things (IIoT). In doing so exposing the ICS/SCADA to the same threats and perils as its enterprise counterpart. Come join us as we discuss ways and techniques that Palo Alto Networks NGFW can be used to achieve ideal network segmentation.

      Read more >
    • ISA 62443 Patch Management Overview and Methods for Zero-Day Threat Protection
      ISA 62443 Patch Management Overview and Methods for Zero-Day Threat Protection Joe Weiss, Managing Director for ISA99; William Cotter, Systems Engineering Specialist; Delfin Rodillas, Sr. Manager of SCADA Recorded: Apr 8 2015 4:00 pm UTC 67 mins
    • The growing presence of widely known and used Commercial Off-the-Shelf (COTS) systems in Industrial Control Systems (ICS) provides an increased opportunity for cyber attacks against ICS equipment. Such attacks, if successful, could have severe impact to not only process availability but also safety. Patch management is one particular area of cybersecurity which requires special attention when applied to ICS. It is part of a comprehensive cybersecurity strategy that increases cybersecurity through the installation of patches that resolve bugs, operability, reliability, and cyber security vulnerabilities. The ISA-TR62443‑2‑3 technical report, developed by the ISA 99 Working Group 6, addresses the patch management aspect of ICS cyber security. Also part of an effective strategy is the use of compensating cybersecurity controls to protect ICS systems from exploits and malware in between often long patching cycles. Novel network and host based technologies have recently become available to address even zero-day threats which bypass conventional signature-based approaches.

      Attendees of this webinar will leave with a better understanding of:
      -The unique aspects of ICS that entail a different and more rigorous approach to patch management than that used in business networks
      - An overview of the ISA 99 standards efforts with detail review of the main aspects of the ISA-TR62443-2-3 Technical Report on Patch Management in IACS
      - Advancements in compensating cybersecurity controls for protecting systems from zero-day threats

      Read more >