2. ICS Security Architecture with Dale Peterson

  Рет қаралды 5,431

S4 Events

S4 Events

Күн бұрын

Learning Goal: To understand the key network architecture decisions that affect cyber risk.
Dale Peterson provides the second lecture with 45 minutes on ICS Security Architecture. Along with Marty's: Know Your ICS lecture, this provides the basics so we are all on the same page moving forward. It is aimed at the engineer or operations professional new to cybersecurity. That said, I think there are a few gems in the specific stories even if you know all about security perimeters, remotes access and other basics.
Questions to consider and comment on:
1) What are some examples of common ICS communication you would not want to allow through your Enterprise / ICS security perimeter? And what would you do if your ICS application requires a large number of ports allowed through the security perimeter?
2) How many DMZ's should you have for your Enterprise / ICS security perimeter, and what is the purpose for each DMZ?
3) What remote access to you allow to your ICS? How many people from what organizations? How often?
4) If you say the security perimeter between the enterprise/corporate network and the ICS is your first or primary security perimeter, where would you put your second security perimeter?
*Strategic Pull Quote: "We are not in this game to see who can deploy and maintain the most security controls, our goal is to manage risk to a level appropriate to the company."*
*KEY QUESTION:* Are there security controls you have in place today or see widely recommended that have lead to little or no reduction in cyber risk?

Пікірлер: 3
@carsforless2381
@carsforless2381 3 жыл бұрын
I really love you presention, pretty insightful. I am begineer to learn ICS security, could u please guide from where i should stsrt ? I am an electrical engineer with 12 years of experience..
@S4Events
@S4Events 3 жыл бұрын
Suggest you watch all the videos in that OnRamp playlist. Then pursue an asset owner/company in your field that has an ICS and see if they have OT security openings.
@carsforless2381
@carsforless2381 3 жыл бұрын
@@S4Events well, that would be amazing, do u think sir after watchong all videos, i would be able to do so? I mean to find open ports, vulenrabilties etc would require a lot of experience inst it? Love to hear from you sir...
3. ICS Protocols with Adam Crain
32:11
S4 Events
Рет қаралды 2,2 М.
Is The Purdue Model Dead?
30:39
S4 Events
Рет қаралды 6 М.
WHAT’S THAT?
00:27
Natan por Aí
Рет қаралды 14 МЛН
Iron Chin ✅ Isaih made this look too easy
00:13
Power Slap
Рет қаралды 36 МЛН
БИМ БАМ БУМ💥
00:14
⚡️КАН АНДРЕЙ⚡️
Рет қаралды 4,3 МЛН
🤔Какой Орган самый длинный ? #shorts
00:42
6. The Threat To ICS with Rob Lee
48:38
S4 Events
Рет қаралды 5 М.
ISAGCA Cybersecurity Risk Assessment ANSI/ISA 62443-3-2
1:02:13
International Society of Automation - ISA
Рет қаралды 9 М.
The Five ICS Cybersecurity Critical Controls Webcast
1:05:41
SANS ICS Security
Рет қаралды 5 М.
Cyber Security of Industrial Control Systems
1:24:35
Stanford
Рет қаралды 38 М.
A Tale Of Two (Very Different) Secure ICS Architectures
26:08
S4 Events
Рет қаралды 4,5 М.
Network Security - Deep Dive Replay
3:08:19
Kevin Wallace Training, LLC
Рет қаралды 141 М.
PIPEDREAM - Most Flexible & Capable ICS Malware To Date
31:42
Webinar: OT Cybersecurity for IT Professionals
1:00:28
Dragos: OT Cybersecurity
Рет қаралды 7 М.
Какой ноутбук взять для учёбы? #msi #rtx4090 #laptop #юмор #игровой #apple #shorts
0:18
Опасность фирменной зарядки Apple
0:57
SuperCrastan
Рет қаралды 11 МЛН
My iPhone 15 pro max 😱🫣😂
0:21
Nadir Show
Рет қаралды 1,1 МЛН
Xiaomi SU-7 Max 2024 - Самый быстрый мобильник
32:11
Клубный сервис
Рет қаралды 534 М.
АЙФОН 20 С ФУНКЦИЕЙ ВИДЕНИЯ ОГНЯ
0:59
КиноХост
Рет қаралды 1,2 МЛН