Spelunking Through the Steps of a Control System Hack

Posted on in Presentations

Ever wonder what a hack on an industrial process using real-world Tactics Techniques and Procedures (TTP) really looks like? This session will demonstrate an attack step by step from the initial discovery, to the physical impact to reducing the chance of the attack in the first place.

Amie Wozniak


Project Manager, Nth Degree

Cecilia Marinier


Innovation and Scholar Program Director, RSA

Dan Gunter

Speaker, Participant

Founder and CEO, Insane Forensics

Tom VanNorman

Speaker, Participant

Co-founder, ICS Village

Technology Infrastructure & Operations

network security remote access attacks operational technology (OT Security) security & threat visualization



Share With Your Community