Spelunking Through the Steps of a Control System Hack


Posted on in Presentations

Ever wonder what a hack on an industrial process using real-world Tactics Techniques and Procedures (TTP) really looks like? This session will demonstrate an attack step by step from the initial discovery, to the physical impact to reducing the chance of the attack in the first place.

Participants
Amie Wozniak

Participant

Project Manager, Nth Degree

Cecilia Marinier

Participant

Innovation and Scholar Program Director, RSA

Dan Gunter

Speaker, Participant

Founder and CEO, Insane Forensics

Tom VanNorman

Speaker, Participant

Co-founder, ICS Village

Technology Infrastructure & Operations

network security remote access attacks operational technology (OT Security) security & threat visualization


Topic

Subtopic


Share With Your Community