Tag Archives: Converged Security

ICS Security Convergence: Don’t Miss the Big Picture, Onsite Conference


This entry was posted by on .

Reality…our critical infrastructure environments are becoming more interconnected while our security efforts continue to be disconnected and function within organizational / technology silos. Truth is that current and emerging threat actors don’t attack in silos. In this sharing and discussion session, we’ll talk about how the convergence of physical security, enterprise IT and SCADA event data can help your organization do more with less.

ICS_Joint_working_group_Don't_miss_the_big_picture

Main topics include:
 Example scenarios that outline how threat actors attack all three silos and where individual events may be authentic, but when correlated, are not reflective of authorized activity.
 How technology can be leveraged to actively enforce policies instead of just monitoring then reporting on violations
 Getting away from the 3 ring binder approach to incident management and how having automated and manual response mechanisms allow organizations to effectively respond and remediate.
 Discuss and give example of actionable and focused threat intelligence using existing data feeds and OSINT
 Show how a security foundation that includes physical, IT and SCADA allows for efficient compliance and enables real security
 Know who is accessing your critical devices: Contextual data around the behaviors, incidents and overall access footprint of your privileged users
Real world examples, stories and techniques demonstrated during the session make this presentation standout. Presenter’s experience from all sides of security in ICS (attacker, defender, policy maker, auditor) provides a unique point of view on implementing effective security while not impacting operations. read more