Posted on
in Presentations
The ‘how’ is no longer a question in today’s advanced persistent threat (APT) as exploits’ availability becomes rampant from both shallow and the dark web, but ‘when’ where every industrial control system’s security and incident responders are still not ready.
Learning Objectives:
1: Gain understanding of cyber-kinetic attack vectors through demos.
2: Learn how to attack and defend ICS/SCADA (applicable to red and blue teamers).
3: Understand threat modeling that can be used to formulate effective security posture.
Pre-Requisites:
ICS/SCADA, digital forensics, malware analysis, incident response.
Learning Objectives:
1: Gain understanding of cyber-kinetic attack vectors through demos.
2: Learn how to attack and defend ICS/SCADA (applicable to red and blue teamers).
3: Understand threat modeling that can be used to formulate effective security posture.
Pre-Requisites:
ICS/SCADA, digital forensics, malware analysis, incident response.
Share With Your Community