Using Honeypots to Determine Who Is Targeting SCADA and Control Systems


Posted on in Presentations

Operational technology devices connected to the Internet can be used as a pivot for network ingress, or directly attacked to cause kinetic effect. The presenters deployed 12 ‘Conpot’ honeypots and collected data for 30 days, recording 40,163 interactions, with 93% of traffic initiated by cybersecurity providers, which raises a number of issues. This talk will discuss the significant implications for this activity.

Learning Objectives:
1: Understand the most commonly targeted control system protocols.
2: Find out the types of attackers targeting your network.
3: Learn how a honeypot can help to protect your systems.


Join the RSAC Professional Membership to unlock AI-powered summaries, mind maps, and slides for this and other RSAC Conference presentations. Learn more.

Participants
Professor Andrew Woodward

Participant

Executive Dean of Science, Edith Cowan University


Share With Your Community