Search

Search

Securing SCADA/ICS Based Environments

Securing SCADA/ICS Based Environments

Main Speaker:


David Shiffman

Tracks:

After Event Workshops
Cyber

Seminar Catgories:

After Event
Cyber

Seminar ID:

42194

Date:

24.11.2019

Time:

Daily seminar
9:00-16:30

Location:

Jonn Bryce ECO Tower

Add to Calendar 24.11.2019 09:00 24.11.2019 16:30 Asia/Jerusalem Securing SCADA/ICS Based Environments

SCADA (Supervisory Control & Data Acquisition) & ICS (Industrial Control Systems) are both heavily used for civilian, governmental and enterprise systems. As digitalization pushes such systems to handle, monitor and maintain more data – it becomes a common & preferred targets for cyber-attacks.

The program was designed in a comprehensive and professional manner, with the aim of imparting the skills and knowledge required to integrate in key positions of the information security world, both in defense and attack teams.  Participants will learn about the security threats that are unique to ICS/SCADA systems

Organizations, both civilian and government are trying to build security teams to protect the ICS/SCADA environment.

This seminar details major capabilities which are crucial for Cyber experts aiming to protect ICS/SCADA based systems.

Overview

SCADA (Supervisory Control & Data Acquisition) & ICS (Industrial Control Systems) are both heavily used for civilian, governmental and enterprise systems. As digitalization pushes such systems to handle, monitor and maintain more data – it becomes a common & preferred targets for cyber-attacks.

The program was designed in a comprehensive and professional manner, with the aim of imparting the skills and knowledge required to integrate in key positions of the information security world, both in defense and attack teams.  Participants will learn about the security threats that are unique to ICS/SCADA systems

Organizations, both civilian and government are trying to build security teams to protect the ICS/SCADA environment.

This seminar details major capabilities which are crucial for Cyber experts aiming to protect ICS/SCADA based systems.

Who Should Attend

  • IT Managers
  • Basic Computer use

Course Contents

  • ICS Network Architectures
  • ICS Protocols over TCP/IP
  • Known ICS Protocols
  • How to Approach Protocols Research
  • Cyber-security for ICS
  • ICS Protocol Fuzzing
  • Wireshark Analysis


Contact
close slider