Top Cybersecurity Training Protects Your Assets - Learn From the BEST and Apply New Knowledge Immediately!


To attend this webcast, login to your SANS Account or create your Account.

This webcast has been archived. To view the webcast login into your SANS Portal Account or create an account by clicking the "Get Registered" button on the right. Once you register, you can download the presentation slides below.

The Road to Increased Asset Visibility: Building an Effective ICS Security Strategy

  • Wednesday, May 24, 2017 at 3:00 PM EDT (2017-05-24 19:00:00 UTC)
  • Aruna Sreeram, Eric Cornelius


  • Leidos

You can now attend the webcast using your mobile device!



In the seven years since "stuxnet," we have witnessed a rise in targeted critical infrastructure attacks. Adversariestactics and procedures continue to become more targeted, dynamic, and sophisticated, causing significant harm to companies that are compromised. As critical infrastructure defenders we need to stay ahead in an ever-evolving threat landscape by increasing visibility into ICS devices and using this visibility to understand what assets are deployed, whether they are under management or not, their physical location and relationship in the operational technology hierarchy.†Why?†Whether you have a Bulk Electric System (BES) cyber asset or a set of controls for a chemical plant, you cannot protect what you dont know you have!†In order for organizations to have an effective security strategy, you need one that starts with visibility into all deployed assets.†Join this webinar to hear from Eric Cornelius, the Director of Critical Infrastructure and Industrial Control Systems (ICS) at Cylance, Inc and a SANS ICS instructor and Karl Perman, Leidos Cyber, ICS Security Expert about current best practices to achieve visibility and deep knowledge in Critical Infrastructure Security Controls.†As you gain knowledge of the latest Critical Security Controls update, you will also learn how to leverage visibility to;

  • To create baselines to keep control of your deployed assets
  • Detect changes in the baseline where malware could be lurking
  • Achieving deep ICS device visibility and real-time alerting of devices out of compliance with security policies
  • Use intelligent reports to document system changes
  • How to use new tools to find and report on newly deployed assets in the OT network
  • Putting these newly found assets into a graphical hierarchy

Speaker Bios

Aruna Sreeram

Aruna Sreeram leads the Product Management and Product Operations teams at Leidos Cyber. She has been with the company for over four years and was part of the Industrial Defender (ID) team before IDís acquisition by Lockheed Martin. Aruna has been instrumental in shaping the ASM product during her tenure, working with customers and ICS industry thought leaders and leads the Leidos Cyber team in future product direction. Aruna is a reformed software developer with past positions at RSA and Axeda.

Eric Cornelius

Eric Cornelius is the Director of Critical Infrastructure and Industrial Control Systems (ICS) at Cylance, Inc. where he is responsible for thought leadership, architecture, and consulting implementations. Eric brings a wealth of ICS knowledge and his leadership keeps organizations safe, secure, and resilient against advanced attackers.

Eric is the co-author of "Recommended Practice: Creating Cyber Forensics Plans for Control Systems" as part of the DHS National Cyber Security Division, Control Systems Security Program, 2008 and is also a frequent speaker and instructor at ICS events across the globe.

Need Help? Visit our FAQ page or email

Not able to attend a SANS webcast? All Webcasts are archived so you may view and listen at a time convenient to your schedule. View our webcast archive and access webcast recordings/PDF slides.