Industrial Control Systems Summit Solutions Track 2024

  • Monday, 17 Jun 2024 10:00AM EDT (17 Jun 2024 14:00 UTC)
  • Speaker: Dean Parsons

Adversaries targeting critical infrastructure systems (power grids, water management systems, heavy manufacturing, oil and gas refineries and pipelines, etc.) have demonstrated detail technical knowledge of control system components, industrial protocols, and engineering operations. These skilled and brazen adversaries continue to launch a combination or Ransomware and targeted ICS tailored attacks against the safety and reliability of critical infrastructure. In doing so, they knowingly put human life and physical devices at risk.

Modern industrial control system (ICS) / operational technology (OT) security requires a combination of ICS specific technology platforms, and trained human ICS cybersecurity defenders to protect these engineering systems. In fact, the ICS Active Cyber Defense is defined as "human analysts who can monitor for, respond to adversaries internal to the network". Effective ICS/OT-specific cybersecurity platforms can be leveraged by human ICS defenders who must understand the detailed technical knowledge of control system components, industrial protocols, and engineering operations. Just like the adversaries know. Does your ICS/OT Cybersecurity deploy ICS/OT specific technology to address these modern ICs/OT cybersecurity challenges? Is your cybersecurity trained on ICS/OT specific operations? In the 2024 ICS Solutions Track we put technologies to the test.

This virtual event will illustrate the challenges, risks, and impacts of incidents in control systems. As well, provide practical, achievable actionable to take to meet these challenges head-on. In the events' presentations, live demonstrations and panel discussions, Sponsors and guest speakers are required to align with industry frameworks and practices such as the SANS 5 ICS Cybersecurity Critical Controls, and practical real-world cases studies. We will show how ICS-specific trained defenders can step up to protect and defend the critical infrastructure we all rely on in our daily lives, with ICS-specific technologies in the hands of capable ICS/OT security defenders and engineering teams.

--> To view the full agenda for this event, please scroll down.
--> Connect with fellow attendees, invited speakers, and more via our dedicated Summit Slackworkspace.

ICS Security Summit Solutions Track 2024

Thank You To Our Sponsors

Acronis-logo-white-large.pngClaroty-Logo-2022-FullColor.pngCyolo_Logo_Colors-Green_and_Black.pngDispel_Remote_Access_Light_Background.svgPRIMARY_LOGO_Dragos_Logo_RGB_Transparent.pngtransparent EISAC logo.pngFortinet_Logos_Color.pngKeysight_Color.pngnozomi-networks-logo-color.pngopswat-logo-2018.pngPsymetis-Logo.pngSalvador_logo_Tall_White_PNG.pngsie-logo-petrol-rgb.pngxage-logo-full-color.png

Full Agenda

Timeline (EDT)Session Details
10:00am - 10:10amEvent Kickoff & Introduction

Dean Parsons, Event Chairperson & SANS Certified Instructor
10:15am - 10:45amActionable Approaches to Threat Mitigation and Response in OT
In today's interconnected world, Operational Technology (OT) environments face an ever-evolving array of threats. To safeguard critical infrastructure and ensure continuity, organizations must adopt proactive and practical approaches to threat mitigation and response. This session will delve into actionable strategies aimed at fortifying OT security:

- Practical approaches to collecting and aggregating environmental intelligence and asset information to build an understanding of your environment
- Understanding events vs incidents and how to respond accordingly
- Ensuring safety, resilience, and availability while mitigating threats
- Unifying people, process and technology into a cohesive and actionable infrastructure

Kevin Kumpf, Chief OT/ICS Security Strategist at Cyolo
10:50am - 11:20amDo No Harm: OT Native Network Monitoring of OT Environments
Operational Technology (OT) environments face increasingly sophisticated threats, underscoring the need for cybersecurity strategies tailored to their unique complexities. Traditional IT security methods are insufficient for OT/ICS environments, which demand a nuanced approach that safeguards critical infrastructure while preserving operational integrity.

In this presentation, Nick Shaw of Dragos will discuss the importance of an OT-native cybersecurity methodology, utilizing the SANS Five Critical Controls and principles of non-disruptive extended visibility. This approach is designed to enhance protection while ensuring minimal disruption, thereby strengthening continuity without impeding vital operations.

Participants will gain a clear understanding of how the Dragos Platform enables organizations to effectively implement critical controls within their own OT environments. They will learn practical strategies to maintain robust security measures that support ongoing operational processes without causing disruption.

Nick Shaw, Principal Advisory Solution Architect at Dragos
11:25am - 11:55amStrategies for Securing OT/ICS Networks from Removable Media and Cyber Threats
Transferring data securely and efficiently into high impact networks amidst digitalization and Industry 4.0 is a necessity, but also poses major security risks with the use of removable media like USBs and vendor laptops. Cyber threats can infiltrate air-gapped networks and potentially cause organization disruption or even cyber-physical damage. Security controls like static file scanning with traditional AV engines are often used, however, they continue to fall short in mitigating these threats.

This session will cover the importance of integrating advanced scanning technologies, policy enforcement, discuss successful deployment options and outline strategies to effectively scan and sanitize files, and help ensure compliance with industry standards to safeguard secure environments against cyber threats.

Matt Wiseman, Director of Product Marketing at OPSWAT
12:00pm - 12:20pmBREAK
12:25pm - 12:55pmAchieving Universal Zero Trust Access and Critical Asset Protection
Zero Trust Network Access (ZTNA) has been growing in popularity for several years. Recently, we saw demand skyrocket with the disclosure of several vulnerabilities in popular VPN providers. While ZTNA is a more secure solution, there are still some concerns that traditional ZTNA may expose assets to threats, serving as a pivot point for lateral movement. It’s critical that organizations implement not just ZTNA, but asset protection as well. Attendees will gain an understanding of how zero trust principles interlace with asset protection concepts, and what to look for in technology offerings promising these capabilities.

Roman Arutyunov, Co-Founder and Senior Vice President of Products at Xage
1:00pm - 1:30pmIt Takes a Platform: Security Cyber-Physical Systems with Fortinet Security Fabric OT Security Platform
Previously air-gapped OT environments are becoming increasingly connected due to Digital Transformation demands and production risk reduction initiatives while also supporting a growing need for remote access. The Fortinet OT Security Platform provides a broad, integrated, and automated platform addressing the challenges of IT-OT convergence and tailored to the constraints found in OT and IT. Solutions to convergence challenges include customizing products to unique OT environmental conditions, such as rugged firewalls and switches, advanced threat protection offerings including endpoint protection, deception, sandboxing, and SecOps tools that can scale across IT and OT.

Richard Springer, Director of Marketing OT Solutions at Fortinet
1:35pm - 2:05pmTop Mistakes to Avoid in Security OT Networks
Attend this talk to learn what your fellow OT practitioners have discovered in their journey to secure their OT infrastructure – across multiple industries. We’ll take you on a journey in securing your OT infrastructure – the critical steps, unearthing ‘gotchas’ that others have experienced, that all build upon each other to enhance your security. Walk away with practical guidance for securing your own OT infrastructure, regardless of whether you’re running a plant, a mill, BMS, hospital devices or other OT.

Ben Stirling, ICS Security Engineering Lead at Claroty
Pamela Warren, Public Sector Principal at Claroty
2:10pm - 2:40pmScaling ICS Visibility to New Heights

Eric Floyd, Director of Industrial Business Development and Alliances at Keysight Technologies
Phil Page, Director of Tech Alliances & OEM Partners at Nozomi Networks
2:45pm - 3:00pmEvent Recap & Closing Remarks

Dean Parsons, Event Chairperson & SANS Certified Instructor