ICS Network Security Analysis

Presented by

Phil Trainor, Keysight Security Solutions

About this talk

This talk will review the recent Hack the Building exercise hosted by the US Cyber Command and Maryland Innovations and Security Institute, where Keysight solutions were used to intercept and forward malicious events to security solutions and collect data. By the end of this 35 minute session, the audience will take away best practices for efficient collection and analyzation of malicious network events targeting industrial control networks.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (76)
Subscribers (6136)
Let us help you simulate your designs, validate your prototypes, manufacture with the highest quality, and test and monitor your network strength within your data center and into the cloud. Enterprises, governments and service providers use Keysight solutions to improve network and security operations (NetOps and SecOps) and IT management through an end-to-end visibility infrastructure that includes physical and virtual networks, applications, and security. View our content and learn how Keysight can strengthen your security posture through rigorous testing and improve network performance with dynamic network intelligence.