2. ICS Security Architecture with Dale Peterson

  Рет қаралды 5,431

S4 Events

S4 Events

Күн бұрын

Learning Goal: To understand the key network architecture decisions that affect cyber risk.
Dale Peterson provides the second lecture with 45 minutes on ICS Security Architecture. Along with Marty's: Know Your ICS lecture, this provides the basics so we are all on the same page moving forward. It is aimed at the engineer or operations professional new to cybersecurity. That said, I think there are a few gems in the specific stories even if you know all about security perimeters, remotes access and other basics.
Questions to consider and comment on:
1) What are some examples of common ICS communication you would not want to allow through your Enterprise / ICS security perimeter? And what would you do if your ICS application requires a large number of ports allowed through the security perimeter?
2) How many DMZ's should you have for your Enterprise / ICS security perimeter, and what is the purpose for each DMZ?
3) What remote access to you allow to your ICS? How many people from what organizations? How often?
4) If you say the security perimeter between the enterprise/corporate network and the ICS is your first or primary security perimeter, where would you put your second security perimeter?
*Strategic Pull Quote: "We are not in this game to see who can deploy and maintain the most security controls, our goal is to manage risk to a level appropriate to the company."*
*KEY QUESTION:* Are there security controls you have in place today or see widely recommended that have lead to little or no reduction in cyber risk?

Пікірлер: 3
@carsforless2381
@carsforless2381 3 жыл бұрын
I really love you presention, pretty insightful. I am begineer to learn ICS security, could u please guide from where i should stsrt ? I am an electrical engineer with 12 years of experience..
@S4Events
@S4Events 3 жыл бұрын
Suggest you watch all the videos in that OnRamp playlist. Then pursue an asset owner/company in your field that has an ICS and see if they have OT security openings.
@carsforless2381
@carsforless2381 3 жыл бұрын
@@S4Events well, that would be amazing, do u think sir after watchong all videos, i would be able to do so? I mean to find open ports, vulenrabilties etc would require a lot of experience inst it? Love to hear from you sir...
3. ICS Protocols with Adam Crain
32:11
S4 Events
Рет қаралды 2,2 М.
What is ICS/OT Cybersecurity? | IT vs OT | OT Communication Protocols
2:49:02
6. The Threat To ICS with Rob Lee
48:38
S4 Events
Рет қаралды 5 М.
PIPEDREAM - Most Flexible & Capable ICS Malware To Date
31:42
The Five ICS Cybersecurity Critical Controls Webcast
1:05:41
SANS ICS Security
Рет қаралды 5 М.
Industrial Control Systems - Understanding ICS Architectures
6:23
Mandiant (Part of Google Cloud)
Рет қаралды 26 М.
Is The Purdue Model Dead?
30:39
S4 Events
Рет қаралды 6 М.
System Reliability and Scalability with Kubernetes and Containers
48:20
Webinar: OT Cybersecurity for IT Professionals
1:00:28
Dragos: OT Cybersecurity
Рет қаралды 7 М.
Look, this is the 97th generation of the phone?
0:13
Edcers
Рет қаралды 7 МЛН
iPhone 16 с инновационным аккумулятором
0:45
ÉЖИ АКСЁНОВ
Рет қаралды 10 МЛН
НЕ БЕРУ APPLE VISION PRO!
0:37
ТЕСЛЕР
Рет қаралды 375 М.