Spelunking Through the Steps of a Control System Hack


Posted on in Presentations

Ever wonder what a hack on an industrial process using real-world Tactics Techniques and Procedures (TTP) really looks like? This session will demonstrate an attack step by step from the initial discovery, to the physical impact to reducing the chance of the attack in the first place.
Participants
Dan Gunter

Speaker

Founder and CEO, Insane Forensics

Tom VanNorman

Speaker

Co-founder, ICS Village

Technology Infrastructure & Operations

network security remote access cyberattacks operational technology (OT Security) threat visualization


Topic

Subtopic


Share With Your Community