On June 2nd and 3rd, thousands from around the globe tuned in for the SANS ICS Security Summit.
We invited Ashton Rodenhiser of Mind's Eye Creative to create graphic recordings of our Summit presentations. If you missed a talk or are looking to view the SANS ICS Security Summit through a visual lens, take a look at the recordings below.
In addition to graphic recordings, PDFs of Summit presentations will be made available on the SANS Summit Archives page (SANS account required) and videos will be posted to YouTube over the next several months.
*If you registered for the Summit, video recordings are available on your Summit Access page in your SANS Portal.
Keynote Discussion with John "Chris" InglisChris Inglis, National Cyber Director, Executive Office of the President
Detection-In-Depth: Out of Band Monitoring for Critical Process ParametersGus Serino, Principal Industrial Hunter, Dragos
Making Use of All Those SBOMsEric Byres, Chief Technology Officer, aDolus Technology Inc.
Success Starts With Failure: Mitigating OT Security Risks Using Threat-Informed Failure ScenariosNik Urlaub, Lead Cybersecurity Engineer, MITRE Corporation
Adam Hahn, Principal Critical Infrastructure Security Engineer, MITRE Corporation
The Underestimated ICS/OT Asset: PrintersGabriel Agboruche, Cybersecurity Manager (Operational Technologies), Accenture
Hunting EtherNet/IP Protocol StacksSharon Brizinov, Vulnerability Research Team Lead, Claroty
Defining Security Functions to Gain Visibility from PLCsMichael Hoffman, Instructor
Gloria Cedillo, Sr Industrial Consultant, Dragos
Are You Prepared for CMMC?Ian Frist, Director, Proactive Services, BlueVoyant
Navigating Australia’s New Critical Infrastructure Threat Landscape: Challenges for Government and IndustryParesh Kerai, Head of Product Strategy and Security, Sapien Cyber
Livin' La Vida Loco(motive): Lessons Learned From Pentesting LocomotivesEmily Crose, Senior Technical Manager, Sophos Labs
Keynote Discussion with Morgan AdamskiMorgan Adamski, Chief of NSA’s Cybersecurity Collaboration Center, National Security Agency (NSA)
Demo: I Can’t Get That Out of My Memory! A PLC’s Story About Love, Loss, and TriumphJeffrey Shearer, SANS Instructor
Case Study: Risks and Mitigations of 5G in Your ICS EnvironmentYohei Ishihara, Security Evangelist, Trend Micro Incorporated
"Intelligent" Board Room Decisions: How to Use Threat-Informed Industrial Risk ManagementJason D. Christopher, Certified Instructor
Life Cycle Engineering: Incorporating Cybersecurity During the Operation and Maintenance PhasesUduak Daniels, ICS Cybersecurity Specialist, Saudi Aramco
We Need to Talk About the CERT/PSIRT ProcessDavid Foose
PLC Code Security: An Attacker's PerspectiveArnaud Soullie, Senior Manager, Wavestone
How Low Can You GoIan Anderson, Mgr, Enterprise Security, OG&E
Bryson Bort, Founder & CEO, SCYTHE
Secure It Right from the Start with Cyber-Informed EngineeringVirginia Wright, Energy Cyber Portfolio Manager, Cybercore, Idaho National Laboratory (INL)
Andrew Ohrt, Resilience Practice Area Lead, West Yost Associates
Control Systems Under PressureDan Noyes, OT Cyber Threats Program Manager, Idaho National Laboratory
If you'd like to check out our other upcoming Summits, you can view the latest listing here.