High Value ICS Network Monitoring and Anomaly Detection - Table Talk
- Monday, February 23rd, 12:30pm - 1:45pm
Small group networking and conversations (8-10 people at a table) led and facilitated by selected cybersecurity experts across several industries over lunch! No presentations or sales pitches!!
NERC CIP v5 and the NIST Cybersecurity Framework both stress the importance of network monitoring in keeping critical infrastructure and processes secure and reliable. However, the definition of ânetwork monitoringâ can be wide-ranging in methods, resources employed and value derived. At each table, the group will explore what monitoring practices our experts and you see employed today and what they/you believe it will take to meet the requirements and guidelines from NERC and NIST in the next few years, as well as monitoring processes and tools that will provide the highest ROI in security and reliability in the future.
The following bonus sessions are open to all paid attendees at no additional cost. There are many different types of events that fall into these categories:
- SANS@Night: Evening presentations given after day courses have ended. This category includes Keynotes.
- Special Events: SANS-hosted events and other non-technical recreational offerings. This category includes, but is not limited to, Receptions and Information Tables.
- Vendor: Events hosted by external vendor exhibitors.
- Lunch & Learn: Short presentations given during the lunch break.
|Advanced CRPA/C2M2 Workshop||—||Sunday, February 22nd, 8:30am - 4:30pm||Special Events|
|ES-ISAC Briefing||—||Sunday, February 22nd, 5:00pm - 6:00pm||SANS@Night|
|Welcome Reception||—||Sunday, February 22nd, 5:00pm - 7:00pm||SANS@Night|
|Exposure to Closure: 2015||—||Sunday, February 22nd, 7:00pm - 10:00pm||SANS@Night|
|Vendor Showcase||—||Monday, February 23rd, 10:30am - 11:00am||Vendor Event|
|Emerging Best Practice for ICS Perimeter Cyber Security||Michael Piccalo, Director of Industrial Security||Monday, February 23rd, 12:30pm - 1:45pm||Lunch and Learn|
|Just how easy is it to hack a DCS?||Dr. Alex Tarter, Technical Director, Cyber Security Group||Monday, February 23rd, 12:30pm - 1:45pm||Lunch and Learn|
|High Value ICS Network Monitoring and Anomaly Detection - Table Talk||—||Monday, February 23rd, 12:30pm - 1:45pm||Lunch and Learn|
|Vendor Showcase||—||Monday, February 23rd, 3:45pm - 4:15pm||Vendor Event|
|WOPR: Shall we play a game?||—||Monday, February 23rd, 7:00pm - 10:00pm||SANS@Night|
|KIPS, Kaspersky Industrial Protection Simulation||—||Monday, February 23rd, 7:00pm - 9:00pm||SANS@Night|
|Vendor Showcase||—||Tuesday, February 24th, 10:30am - 11:00am||Vendor Event|
|Developing an Industrial Controls Security Framework for balanced and targeted investment||Ernie Hayden CISSP CEH GICSP||Tuesday, February 24th, 12:45pm - 2:00pm||Lunch and Learn|
|Attacker Behavior & Incident Response||Pat Haley||Tuesday, February 24th, 12:45pm - 2:00pm||Lunch and Learn|
|Designing a Safe, Intelligent, Security Architecture||Richard Devera||Tuesday, February 24th, 12:45pm - 2:00pm||Lunch and Learn|
|Vendor Showcase||—||Tuesday, February 24th, 3:30pm - 4:00pm||Vendor Event|