From Exposure to Closure
Sunday, March 16
In its fourth year running, "Exposure to Closure" series is returning to ICS Summit 2014! This fictional "whodunit" surrounds when a company discovers they've been severely compromised. It follows through several story lines of attackers, researchers intelligence analysts, and follows through forensic deconstruction, vulnerability mitigation, and on to recovery.
Tim Roxey is pulling together cast of actual researchers, intelligence analysts, law enforcement officers, private-sector asset owners and others who work in these murky worlds. This cast will perform on stage to put forth a scenario for a fun but thoughtful exercise to explore incident response issues, tracking threat actors, and national level security issues surrounding ICS networks.
Be warned: you may find yourself right in the center of this dramatic whodunit.
This session is a fun and interactive way to illustrate how a global community works together in partnership to evaluate emergent threats to, and vulnerabilities, in ICS networks. This event will depict the evolution of phases to develop mitigation schemas and notify industry of successes and challenges. Specific examples from NERC and others will be proffered.
The audience will:
- Be exposed to the entire spectrum of the cyber security realm; this includes the identification of vulnerabilities and threats to the risk assessment, mitigation as well as response and recovery of a cyber event
- Observe a Master Sequence of Events List (MSEL) scenario-based exercise
- Gain familiarity with tools, tactics, & procedures of an adversary & apply concepts to better understand real world threats & vulnerabilities
- Gain an appreciation of Security Maturity Models and how to apply them
Mon Feb 11th, 2013
6:00 PM - 10:00 PM