The Top 20 Security Controls Adapted to ICS

  • Wednesday, 09 Dec 2015 3:00PM EST (09 Dec 2015 20:00 UTC)
  • Speaker: Wm. Arthur Conklin

The top 20 security controls have been a mainstay for IT network security for years. But an ICS network is not an IT network, so how can we apply the top 20 to an ICS network? This webinar will look at the overall problem and dive into the controls, control by control, aligning them to an ICS environment.


Learn more about securing industrial control systems at the upcoming ICS Security Summit in Orlando, FL on February 22 & 23, 2016.

The Summit is the premier event to attend in 2016 for ICS cybersecurity practitioners and managers. This year's summit will center on the theme "Defense is Doable" and will feature more in-depth technical talks, case studies, and hands-on challenges than ever before.

Attendees will:
  • Understand how ICS systems are being targeted
  • Learn how to safeguard ICS against the new threat matrix
  • Gather with fellow practitioners to share skills and acquire new ones
  • Explore how cyber-informed engineering mixes with cyber security for ICS success
  • Discover best practices for teaching operators cyber security awareness
  • Test and expand ICS security knowledge through exciting hands-on challenges