Emerging Best Practice for ICS Perimeter Cyber Security
- Michael Piccalo, Director of Industrial Security
- Monday, February 23rd, 12:30pm - 1:45pm
Malware continues to evolve becoming more powerful and more elusive, putting the safety and reliability of our critical infrastructure increasingly more at risk. Cyber security experts increasingly assert that IT firewall / perimeter defenses are porous, and that other measures must be deployed to protect IT networks.
This advice is a poor fit for control system networks. The nature of control system networks is that they will always be softer targets than IT networks. Firewalls and other software-based security solutions, even when deployed in layers, have been compromised time and again.
In this session, we will explore some of the reasons why firewalls and other IT technologies are no longer effective against modern threats and we explore how unidirectional security gateway technology, a global emerging best practice that utilizes hardware to enforce security, can help mitigate modern threats while keeping the real-time data feed available to the business users that rely on this information.
The following bonus sessions are open to all paid attendees at no additional cost. There are many different types of events that fall into these categories:
- SANS@Night: Evening presentations given after day courses have ended. This category includes Keynotes.
- Special Events: SANS-hosted events and other non-technical recreational offerings. This category includes, but is not limited to, Receptions and Information Tables.
- Vendor: Events hosted by external vendor exhibitors.
- Lunch & Learn: Short presentations given during the lunch break.
Sunday, February 22
|Advanced CRPA/C2M2 Workshop||—||Sunday, February 22nd, 8:30am - 4:30pm||Special Events|
|ES-ISAC Briefing||—||Sunday, February 22nd, 5:00pm - 6:00pm||SANS@Night|
|Welcome Reception||—||Sunday, February 22nd, 5:00pm - 7:00pm||SANS@Night|
|Exposure to Closure: 2015||—||Sunday, February 22nd, 7:00pm - 10:00pm||SANS@Night|
Monday, February 23
|Vendor Showcase||—||Monday, February 23rd, 10:30am - 11:00am||Vendor Event|
|Emerging Best Practice for ICS Perimeter Cyber Security||Michael Piccalo, Director of Industrial Security||Monday, February 23rd, 12:30pm - 1:45pm||Lunch and Learn|
|Just how easy is it to hack a DCS?||Dr. Alex Tarter, Technical Director, Cyber Security Group||Monday, February 23rd, 12:30pm - 1:45pm||Lunch and Learn|
|High Value ICS Network Monitoring and Anomaly Detection - Table Talk||—||Monday, February 23rd, 12:30pm - 1:45pm||Lunch and Learn|
|Vendor Showcase||—||Monday, February 23rd, 3:45pm - 4:15pm||Vendor Event|
|WOPR: Shall we play a game?||—||Monday, February 23rd, 7:00pm - 10:00pm||SANS@Night|
|KIPS, Kaspersky Industrial Protection Simulation||—||Monday, February 23rd, 7:00pm - 9:00pm||SANS@Night|
Tuesday, February 24
|Vendor Showcase||—||Tuesday, February 24th, 10:30am - 11:00am||Vendor Event|
|Developing an Industrial Controls Security Framework for balanced and targeted investment||Ernie Hayden CISSP CEH GICSP||Tuesday, February 24th, 12:45pm - 2:00pm||Lunch and Learn|
|Attacker Behavior & Incident Response||Pat Haley||Tuesday, February 24th, 12:45pm - 2:00pm||Lunch and Learn|
|Designing a Safe, Intelligent, Security Architecture||Richard Devera||Tuesday, February 24th, 12:45pm - 2:00pm||Lunch and Learn|
|Vendor Showcase||—||Tuesday, February 24th, 3:30pm - 4:00pm||Vendor Event|