Prioritizing the CIS Critical Controls for ICS: Learning from recent incidents

  • Webcast Aired Monday, 24 Oct 2016 1:00PM EDT (24 Oct 2016 17:00 UTC)
  • Speakers: Tim Conway, Mike Assante, Walt Sikora

The Center for Internet Security's Critical Controls have helped organizations secure their IT systems; how do we apply them to protect ICS and where do we start? The controls arose from careful analysis of how attacker's were able to compromise systems as a way to inform and prioritize the best defense effort. Defending ICS adds several wrinkles, some having to do with causing no harm to the industrial process, others have more to do with the security objectives and particular architectures. This talk will use examples and help you think about the best controls to consider based on recent ICS incidents.

This webcast will provide participants with:

  • An introduction to the CIS Critical Controls
  • Learning what experts observe about controls adoption experiences and how they map to reducing risks from known incidents
  • Presented with working examples of controls applied to ICS environments