Spelunking Through the Steps of a Control System Hack


Posted on in Presentations

Ever wonder what a hack on an industrial process using real-world Tactics Techniques and Procedures (TTP) really looks like? This session will demonstrate an attack step by step from the initial discovery, to the physical impact to reducing the chance of the attack in the first place.

Participants
Amie Wozniak

Project Manager, Nth Degree

Cecilia Marinier

RSA Conference Program Manager, RSA

Dan Gunter

Founder and CEO, Insane Forensics

Tom VanNorman

Co-Founder, ICS Village

Technology Infrastructure & Operations

network security remote access attacks operational technology (OT Security) security threat visualization


Topic

Subtopic


Share With Your Community