Even as expanding 5G availability and other technological advancements portend an innovative year for industrial control systems (ICS) and operational technology (OT), recent cyber threat research emphasizes the continuing importance of strengthening ICS and OT security.
In 2019, researchers uncovered 11 flaws in an obscure component of operating systems running everything from neonatal incubators to power plant controllers. Known as the Urgent/11, the bugs forced companies around the world to reexamine the security of their networked ICS. Since then, additional batches of vulnerabilities affecting millions of devices have been discovered. As 5G and other factors accelerate the convergence of legacy systems with unsecured technology stacks, attackers will likely take advantage of new and newly exposed vulnerabilities in ICS devices, where some organizations may not even know to look for such security issues.
What You’ll Learn:
- How network stack vulnerabilities reach industrial devices
- Why ICS networks are blind spots for defenders, not attackers
- Best practices for securing your OT/ICS network
- How to set up threat hunting within your OT environment
- Kyle Miller – Operational Technology Lead, Booz Allen
- Graham Dietz – Cyber Threat Intelligence Lead, Booz Allen