Cyber-Kinetic Attack: As Easy as 1-2-3

Posted on in Presentations

The ‘how’ is no longer a question in today’s advanced persistent threat (APT) as exploits’ availability becomes rampant from both shallow and the dark web, but ‘when’ where every industrial control system’s security and incident responders are still not ready.

Learning Objectives:
1: Gain understanding of cyber-kinetic attack vectors through demos.
2: Learn how to attack and defend ICS/SCADA (applicable to red and blue teamers).
3: Understand threat modeling that can be used to formulate effective security posture.

ICS/SCADA, digital forensics, malware analysis, incident response.

Mike Rebultan

DFIR/SecOps (IT/OT), Equinix Inc.

Hackers & Threats


Share With Your Community