Hi [[ session.user.profile.firstName ]]

MITRE ATT&CK® for ICS - Practical Applications

The MITRE ATT&CK® for ICS knowledge base was released in January 2020 and has received a tremendous amount of interest from security professionals.

Join security experts from MITRE, Flex, and Armis to hear practical tips about how you can use the MITRE ATT&CK for ICS knowledge base to assess your current cyber defences and make adjustments to better protect your industrial control environment from cyber attack.

Otis Alexander - Lead Cyber Security Engineer, The MITRE Corporation, will describe how the new ATT&CK for ICS knowledge base compares and contrasts with their previously published knowledge bases, MITRE ATT&CK for Enterprise.

Fritz Wetschnig - Chief Information Security Officer (CISO) and VP, Enterprise Information Technologies at Flex, a global manufacturing organization, will describe how his security team is currently using the MITRE ATT&CK knowledge base to optimize their cyber defenses.

Nadir Izrael - CTO and Co-founder at Armis, will dive deep on practical applications and tips that Armis has recently published regarding cyber defenses for industrial control systems.
Recorded May 20 2020 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Otis Alexander, The MITRE Corporation | Fritz Wetschnig, Flex | Nadir Izrael, Armis
Presentation preview: MITRE ATT&CK® for ICS - Practical Applications

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • We're All Two Hops from the Internet: Rethinking the OT Security Approach Recorded: Jul 1 2020 30 mins
    Nathan Singleton, Manager of Cybersecurity at Helmerich & Payne and Curtis Simpson, CISO at Armis
    When connected devices and sensors run from the pipeline to IP phone or the drill rig to the board room, we can no longer remain focused on the OT device alone in our security strategy. Attackers see one large enterprise, with many possible attack vectors and pivot points. Security teams today need the ability to monitor all vectors and all devices that might be used as part of an industrial attack kill chain.
    Join Nathan Singleton, Manager of Cybersecurity at Helmerich & Payne, and Curtis Simpson, Chief Information Security Officer at Armis, as they discuss the security challenges faced by modern industrial enterprises, the areas of exposure, and the changes needed to protect the modern OT environment.
  • Securing Connected Medical Devices: The New Hippocratic Oath Recorded: Jun 24 2020 58 mins
    Curtis Simpson, CISO at ARmis
    Hospitals and clinics are exploding with new connected medical devices. From infusion pumps to MRI machines, x-ray machines, heart monitors, and communication badges, these connected medical devices help doctors, nurses, and clinicians deliver faster, higher quality care. But they also create an attack surface that most healthcare delivery organizations can’t secure. How do you secure medical devices that can’t take an agent or be scanned? How do you detect and stop ransomware attacks? How do you ensure patient safety and hospital operations? Join Curtis Simpson, CISO of Armis, as he discusses these challenges and how healthcare organizations can protect themselves and their patients
  • 5 Critical Items to Consider When Securing Medical Devices Recorded: Jun 16 2020 51 mins
    Abhishek Argarwal, CISO at Fresenius Medical Care and Curtis Simpson, CISO at Armis
    From an MRI to an infusion pump to wireless Vocera badges to contact bluetooth beacons tracking devices, these equipment bring the promise of better medical care delivery - but only if they are properly secured. Join Abhishek Agarwal, the CISO from Fresenius Medical Care, and Curtis Simpson, CISO from Armis, in this on-demand webinar, as they discuss the new playbook needed to manage risk and maintain patient safety.
  • Taming the Unmanaged and IoT Device Tsunami Recorded: Jun 3 2020 61 mins
    Cybersecurity Guru, Bruce Schneier and Curtis Simpson, CISO at Armis
    Businesses face a tsunami of new, connected devices. Not the traditional computer we may use at work. But devices that run our business, drive our manufacturing lines, or track and deliver healthcare to patients. These devices are essentially the new endpoint with operating systems, an application, and a network stack -connect to networks and even the internet. What they are missing is security. Up to 90% of devices in the enterprise will be unmanaged by 2021. This requires a whole new security playbook to mitigate risk and protect businesses. Join cybersecurity expert Bruce Schneier, Armis CISO Curtis Simpson, and Threatpost Editor-in-Chief Tom Spring as they discuss the reality of facing businesses with the proliferation of these unmanaged and IoT devices, how attacks are growing, and security challenges facing businesses today.

    Bruce Schneier, dubbed a “security guru” by The Economist, is an internationally renowned security technologist and best-selling author of over a dozen books exploring the risks and implications of our new, hyper-connected era. He works at the intersection of security, technology, and people, and has penned hundreds of articles, essays, and academic papers on these topics.

    Curtis Simpson brings more than 15 years of diversified information technology experience, with direct information security and management experience in positions of increasing responsibility at Sysco, a Fortune 50 corporation. As vice president and global CISO at Sysco, Curtis directed a portfolio of cost effective, business-focused security programs responsible for reducing security risks faced by a global organization.
  • Zero Trust Security for Unmanaged and IoT Devices Recorded: May 27 2020 44 mins
    Jack Marsal, Senior Director, Product Marketing at Armis
    The Zero Trust security approach has exploded in recent years. But almost all of the focus has been on applying Zero Trust principles to users and managed computers. Unmanaged and IoT devices have been left out of the conversation, leaving enterprises exposed to attacks on these types of devices.

    Watch this webinar to learn how you can apply Zero Trust security principles to unmanaged and IoT devices. Learn about —
    -Common Zero Trust security tools and architectures
    -How blind spots still exist for unmanaged and IoT devices
    -How Armis extends Zero Trust principles to unmanaged and IoT devices
  • CDPwn: 5 Vulnerabilities in Cisco Device Protocol Recorded: May 26 2020 34 mins
    Ben Seri, VP of Research at Armis and Chris Dobrec, VP of Product Marketing at Armis
    Armis has discovered five critical vulnerabilities in various implementations of the Cisco Discovery Protocol (CDP) that can allow remote attackers to completely take over corporate and network devices without any user interaction. The discovery, dubbed CDPwn, exposes vulnerabilities which could allow an attacker to fully take over switches, routers, IP phones and cameras.

    Watch this webinar to learn how an attacker would use CDPwn to exploit these vulnerabilities leading to:

    -Breaking of network segmentation
    -Data exfiltration of corporate network traffic traversing through an organization's switches and routers
    -Gaining access to additional devices by leveraging man-in-the-middle attacks by intercepting and altering traffic on the corporate switch
    -Data exfiltration of sensitive information such as phone calls from from devices like IP phones and video feeds from IP cameras
  • Asset Inventory: How Security Teams Get a Comprehensive View of IT, IoT, OT and Recorded: May 21 2020 37 mins
    Chris Dobrec, VP of Product Marketing, Armis
    How would you feel if you could get a comprehensive asset inventory across your entire environment - offices, remote locations, manufacturing floors; even off prem devices? All great security programs and compliance frameworks start with comprehensive and accurate asset inventory. And in a world of exploding devices, you need a full accounting of all your devices whether they be IT, IoT, OT, or even medical devices. Join Chris Dobrec, VP Product Marketing of Armis, and Holger Schulze, founder and CEO of Cybersecurity Insiders, for this live webinar as they explore the challenges that security teams face when building a comprehensive and accurate view of all the assets in their environment.

    They will discuss:
    -The wave of unmanaged and IoT devices connecting to today’s networks
    -The fragmentation of device data across different IT and security tools
    -The risks and vulnerabilities these new devices introduce
    -How to get a unified, comprehensive asset inventory
    -How to ensure automated policy and security enforcement
  • MITRE ATT&CK® for ICS - Practical Applications Recorded: May 20 2020 61 mins
    Otis Alexander, The MITRE Corporation | Fritz Wetschnig, Flex | Nadir Izrael, Armis
    The MITRE ATT&CK® for ICS knowledge base was released in January 2020 and has received a tremendous amount of interest from security professionals.

    Join security experts from MITRE, Flex, and Armis to hear practical tips about how you can use the MITRE ATT&CK for ICS knowledge base to assess your current cyber defences and make adjustments to better protect your industrial control environment from cyber attack.

    Otis Alexander - Lead Cyber Security Engineer, The MITRE Corporation, will describe how the new ATT&CK for ICS knowledge base compares and contrasts with their previously published knowledge bases, MITRE ATT&CK for Enterprise.

    Fritz Wetschnig - Chief Information Security Officer (CISO) and VP, Enterprise Information Technologies at Flex, a global manufacturing organization, will describe how his security team is currently using the MITRE ATT&CK knowledge base to optimize their cyber defenses.

    Nadir Izrael - CTO and Co-founder at Armis, will dive deep on practical applications and tips that Armis has recently published regarding cyber defenses for industrial control systems.
  • Best Practices for Medical Device Security Recorded: May 14 2020 46 mins
    Chris Dobrec, VP of Product Marketing, Armis
    Hosted by Health IT Security. Advances in medical device technology help you deliver top-notch care, but who’s making sure those devices are healthy too? Hidden inside things like MRI and x-ray machines, infusion pumps, and patient monitors are vulnerabilities that can put patients at risk.
    These devices have no built-in security controls, they’re impossible to update without arduous recertification, and they can’t host agents traditional endpoint security products require.
    Join Armis to learn about vulnerabilities like URGENT/11 that bad actors can use to take control of critical medical equipment. We’ll discuss real-world threats to devices and provide you best practices to secure your connected medical devices and keep your patients safe.
  • Agentless Device Security for Palo Alto Networks Recorded: May 14 2020 38 mins
    Scott Oldfield, Account Executive from Armis | Travis Dye, Solutions Architect from Armis
    The Armis agentless device security platform gives Palo Alto Networks customers unparalleled device visibility and control. Fast and easy cloud integration with Cortex allows the Armis platform to discover and profile every device, and to analyze device activity for suspicious or malicious behavior. And the platform’s integration with Palo Alto Networks next-generation firewalls (NGFW) blocks suspect devices automatically, helping to ensure sensitive data and systems stay protected.

    Join our webinar on Thursday, May 14 to learn how our joint solution enables you with:
    -Complete asset inventory of every device - managed, unmanaged, IoT and more
    -Deep device behavior insights so for more effective risk management
    -Advanced threat detection and response to find and stop threats and attacks
  • Device Security for Cisco Meraki: Fast, Simple, and Agentless Recorded: May 13 2020 35 mins
    Scott Oldfield, Account Executive from Armis | Cory Brown, Solutions Architect from Armis
    Add Armis to your existing Cisco Meraki infrastructure and get a detailed inventory of every device on your network, the ability to analyze device behavior continuously for risks and threats, and to block suspicious or malicious devices automatically. In just minutes, and with no additional hardware, our cloud-to-cloud integration gives you deep asset inventory of the devices and software on your network, connections between devices, and services being used - and the ability to better manage your risk, and automate policy enforcement.

    Join our webinar on Wednesday, May 13 to learn how our joint solution provides you with:
    -Complete asset inventory of every device - managed, unmanaged, IoT and more
    -Deep device behavior insights so for more effective risk management
    -Advanced threat detection and response to find and stop threats and attacks
  • Armis+Check Point: Visibility & Security for Unmanaged & IoT Devices Recorded: May 7 2020 34 mins
    Scott Oldfield, Commercial Account Manager from Armis and Vincent Vermeulen, Solutions Architect from Armis
    By 2021, up to 90% of devices will be unmanaged. In this world of these unmanaged and IoT devices, Armis integrates with Check Point IoT Security Manager to help organizations reduce exposure to the cyber-risk of unmanaged and IoT devices without disrupting business operations across any environment - industrial, healthcare, manufacturing, retail, and more. By combining the Armis platform’s agentless comprehensive asset discovery and continuous vulnerability assessment with Check Point’s security policy management and security gateways, you can apply a security policy for any device on your environment to mitigate device threats and vulnerabilities.

    Join our webinar on Thursday, May 7 to learn how our joint solution enables you to:
    -Create policies automatically for any unmanaged and IoT device
    -Detect and respond quickly to vulnerabilities and threats
    -Arm security teams with comprehensive device information
  • Comprehensive Asset Inventory Recorded: May 6 2020 36 mins
    Joe Lea, VP of Product, Armis and Chris Dobrec, VP of Product Marketing, Armis
    Can you accurately say how many devices you have and if they are secure?

    Getting a unified and comprehensive IT asset inventory is still a major issue—and pain—for every organization. From managed to unmanaged to IoT devices, from virtual machines to clouds, with data strewn across different systems. For devices in your environment and in your airspace—on your network and remote—can you accurately identify all you have? What is your source of truth? Most companies don’t have this, and this leaves them exposed to compliance, vulnerability, and security issues.

    Join Joe Lea VP Product Management, and Chris Dobrec, VP Product Marketing at Armis to learn how the Armis agentless device security platform brings you comprehensive visibility into all the assets you have by combining data from your network with other existing IT security and management systems to create one source of truth for all your assets—hardware, software, cloud— so you can:

    -Discover every IT asset in your environment
    -Identify risks, vulnerabilities, and gaps in your security posture
    -Automate and enforce security policies so you stay protected
  • Armis+Cisco ISE: Better Threat Detection & Response for Unmanaged & IoT Devices Recorded: May 5 2020 46 mins
    Brian Gonsalves, Sr. Manager, Product Management & Business Development, Cisco | Terrence Davis, Solutions Architect, Armis
    Armis integration with Cisco ISE provides automated threat detection and response for unmanaged and IoT devices. Armis creates a comprehensive inventory that includes device manufacturer, model, location, operating system, installed applications, connections made over time, and a unique risk score that Armis generates for each device. This complements the inventory that Cisco ISE provides for devices on your network, and it gives your security team additional information they can use to proactively reduce your organization’s attack surface.

    Join our webinar on Tuesday, May 5 to learn how our joint solution can:
    -Complement your existing Cisco ISE deployment
    -Automate quarantine for risky or malicious devices
    -Provide advanced threat detection and response
  • Medical Device Security Vulnerabilities and Disclosures Recorded: Apr 30 2020 61 mins
    Curtis Simpson, CISO at Armis and Dor Zusman, Senior Researcher at Armis
    When it comes to medical devices, poor cybersecurity poses risks to patient safety and puts millions at risk. How do companies like Armis find the vulnerabilities that affect billions of devices across the globe? What do you do with information that could be used for sinister means? Join to learn how Armis finds these vulnerabilities and how they safely communicate them to manufacturers, governmental institutions and the public at large.
  • Winning the Cybersecurity Battle in Healthcare Recorded: Apr 29 2020 23 mins
    Chris Dobrec, VP of Product Marketing, Armis
    When it comes to medical device security and the Internet of Things (IoT), poor cybersecurity poses risks to both patient safety and the infrastructure that keeps hospitals running. That’s your classic double whammy, and it’s an ongoing challenge for healthcare security professionals especially as cybercriminals are increasing their attacks of vulnerable healthcare institutions during the current pandemic.

    In this session, please join cybersecurity expert Chris Dobrec, Vice President Product Marketing at Armis as he weighs in on best practices for medical device security, and how to protect your organization from the exploit of connected medical devices.
  • Forrester: State of Enterprise IoT Security Recorded: Oct 22 2019 43 mins
    Merritt Maxim, VP Research Director at Forrester
    "State of Enterprise IoT Security: Unmanaged and Unsecured," a Forrester study commissioned by Armis, explores the current state of unmanaged and IoT device security in North America, as well as future trends.

    In this on-demand webinar, Merritt Maxim, VP Research Director at Forrester, will share the results from the more than 400 enterprise technology decision makers surveyed, including:

    What factors are driving the rapid growth of unmanaged and IoT devices
    What the main risks are
    How many enterprises have already experienced security incidents
    Which security controls are sufficient, which ones are lacking
    How enterprise security professionals are responding to the threats
  • Agentless EDR for Unmanaged & IoT Devices Recorded: Aug 28 2019 53 mins
    Joe Lea, VP of Product, Armis
    Over the past few years, enterprise security managers have adopted Endpoint Detection and Response (EDR) systems to help detect when and how an endpoint has been compromised. But this only solves part of the problem.

    EDR systems do not work on unmanaged devices which will soon outnumber managed devices ten-to-one in enterprise environments and can be used as part of a kill chain, disrupting business operations or even impacting human safety.

    Join our VP of Product, Joe Lea, to learn how Armis is forging a new way forward with an agentless approach to EDR that allows you to monitor un-agentable devices.
  • Eliminate the IoT Security Blind Spot Recorded: Jun 12 2018 58 mins
    Nadir Izrael, Co-founder and CTO, Armis
    Enterprises face an exploding number of unmanaged and IoT devices, which face with the increasing number of cyber attacks targeting these devices. How should IT security managers respond? Join Armis to discuss:

    • Why these devices are the new, insecure endpoint
    • The new attack vectors out of today’s kill chain
    • Why networks segmentation will fail in the IoT Age
    • 5 critical items needed to secure the enterprise

    Presenter: Nadir Izrael

    Bio: Co-founder and CTO, Nadir Izrael guides the technology vision behind Armis to protect unmanaged and IoT devices. He co-founded the company in 2015 with its CEO, Yevgeny Dibrov. Prior to Armis, Nadir worked at Google as senior software engineer. Before Google, Nadir spent six years in the Israeli army, specifically in unit 8200, where he designed and programmed software projects and systems, served as team leader and did officer’s training, attaining the rank of captain.
  • Eliminate the IoT Security Blind Spot with Armis Recorded: Oct 24 2017 39 mins
    Nadir Izrael - CTO Co-Founder
    Our current security architecture is broken. We need a new approach to address the evolving IoT endpoint. Join Armis CTO Nadir Izrael as he discusses:

    -Where current architecture is falling short
    -What next-generation architecture should look like
    -How to address vulnerabilities found in IoT devices/the unmanaged endpoint.

    About Armis:

    Armis eliminates the IoT security blind spot, protecting enterprises from the threat of unmanaged or rogue devices and networks. Customers including Samsung Research America and IDT Corporation trust Armis’ agentless IoT security platform to see and control any device or network. Armis is a privately held company and headquartered in Palo Alto, California.
Agentless device security for unmanaged & IoT devices
Armis is the first agentless, enterprise-class security platform to address the new threat landscape of unmanaged and IoT devices. Fortune 1000 companies trust Armis’ unique out-of-band sensing technology to discover and analyze all managed and unmanaged devices, analyze endpoint behavior to identify risks and attacks, and protect information and systems.

Visit our page for expert information and useful tips on how to keep IoT attacks off of your network

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: MITRE ATT&CK® for ICS - Practical Applications
  • Live at: May 20 2020 5:00 pm
  • Presented by: Otis Alexander, The MITRE Corporation | Fritz Wetschnig, Flex | Nadir Izrael, Armis
  • From:
Your email has been sent.
or close