Learn to Trust Your Insecure ICS Networks

  • Tuesday, 03 May 2016 1:00PM EDT (03 May 2016 17:00 UTC)
  • Speakers: Lisa Lorenzin, David Mattes

Even as ICS security incidents and breaches explode around the world, there are many legacy ICS networks that remain vulnerable to attacks, malware, and other potential security lapses. These legacy networks lack basic security features but may not be replaced for many years. This webinar will explain a relatively simple approach to securing these existing ICS networks using specifications created and vetted by industry experts from the Trusted Computing Group (TCG), working with other industry standards groups on the issue. Attendees will learn how standards-based solutions address the problem of implementing, monitoring, and managing cybersecurity defenses for ICS networks.

The webcast will address how TCG standards support implementation of the ISA/IEC-62443 zone-and-conduit strategy for ICS security. Zones are layers or subdivisions of the logical or physical assets of a control system, based on their control function. Conduits connect the zones, providing a path for data flow, and must be managed to protect network traffic. TCG standards developed by the Trusted Network Communications (TNC) workgroup enable execution of the concepts defined in the ISA/IEC specifications, providing increased security and protection from unauthorized ICS access. Specifically, the Interface for a Metadata Access Point (IF-MAP) Metadata for ICS Security specification facilitates the creation of virtual overlay networks on top of standard shared Internet Protocol (IP) network infrastructure, simplifying deployment, management, and protection of large-scale industrial control systems.