Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Dealing with Remote Access to Critical ICS Infrastructure

Автор: SANS ICS Security

Загружено: 2020-02-29

Просмотров: 4312

Описание:

SANS Asia-Pacific Webcast Series- Dealing with Remote Access to Critical ICS Infrastructure

One of the world's most popular cyber security classes for industrial control systems (ICS) and SCADA is getting another update. New for 2019, ICS410 will now contain a section on dealing with remote access to critical infrastructure and is updating the secure reference network architecture used throughout the class. Join Justin Searle, the author of ICS410, to get a free sneak peek of these new changes to the class.

Speaker Bio

Justin Searle is a Managing Partner of UtiliSec, specializing in Smart Grid security architecture design and penetration testing. Justin led the Smart Grid Security Architecture group in the creation of NIST Interagency Report 7628 and played key roles in the Advanced Security Acceleration Project for the Smart Grid (ASAP-SG). He currently leads the testing group at the National Electric Sector Cybersecurity Organization Resources (NESCOR). Justin has taught courses in hacking techniques, forensics, networking, and intrusion detection for multiple universities, corporations, and security conferences. Mr. Searle is currently a Senior instructor for the SANS Institute. In addition to electric power industry conferences, Justin frequently presents at top international security conferences such as Black Hat, DEFCON, OWASP, Nullcon, and AusCERT. Justin co-leads prominent open source projects including the Samurai Web Testing Framework (SamuraiWTF), the Samurai Security Testing Framework for Utilities (SamuraiSTFU), Middler, Yokoso!, and Laudanum. Justin has an MBA in International Technology and is a CISSP and SANS GIAC certified Incident Handler (GCIH), Intrusion Analyst (GCIA), and Web Application Penetration Tester (GWAPT).

Dealing with Remote Access to Critical ICS Infrastructure

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

NIST Recommendations for ICS & IIoT Security

NIST Recommendations for ICS & IIoT Security

The Five ICS Cybersecurity Critical Controls Webcast

The Five ICS Cybersecurity Critical Controls Webcast

ICS/OT Secure Remote Access

ICS/OT Secure Remote Access

6 Things Not to Do In the Field | SANS ICS Concepts

6 Things Not to Do In the Field | SANS ICS Concepts

Cybersecurity and Zero Trust

Cybersecurity and Zero Trust

Building a Secure OT Network | SANS ICS Concepts

Building a Secure OT Network | SANS ICS Concepts

How to Perform Effective OT Cyber Security Risk Assessments

How to Perform Effective OT Cyber Security Risk Assessments

Is The Purdue Model Dead?

Is The Purdue Model Dead?

Чем ОПАСЕН МАХ? Разбор приложения специалистом по кибер безопасности

Чем ОПАСЕН МАХ? Разбор приложения специалистом по кибер безопасности

Webinar: OT Cybersecurity for IT Professionals

Webinar: OT Cybersecurity for IT Professionals

What is OT | What are OT Cyber Security Challenges | OT Security Solutions | What is  ICS and SCADA

What is OT | What are OT Cyber Security Challenges | OT Security Solutions | What is ICS and SCADA

MITRE ATT&CK® for ICS Live Demonstration

MITRE ATT&CK® for ICS Live Demonstration

The IEC 62443 Standards Plainly Explained

The IEC 62443 Standards Plainly Explained

Practical Industrial Control System Cybersecurity: IT and OT Have Converged - Discover and Defend

Practical Industrial Control System Cybersecurity: IT and OT Have Converged - Discover and Defend

How to Implement Network Segmentation in OT | Verve is now Rockwell Automation SecureOT

How to Implement Network Segmentation in OT | Verve is now Rockwell Automation SecureOT

ВЕЛИКИЙ ОБМАН ЕГИПТА — Нам врали о строительстве пирамид

ВЕЛИКИЙ ОБМАН ЕГИПТА — Нам врали о строительстве пирамид

PIPEDREAM – Most Flexible & Capable ICS Malware To Date

PIPEDREAM – Most Flexible & Capable ICS Malware To Date

A Tale Of Two (Very Different) Secure ICS Architectures

A Tale Of Two (Very Different) Secure ICS Architectures

Secure Remote Access to the Plant Floor from #Dispel and #Grantek - Engineer in a Box

Secure Remote Access to the Plant Floor from #Dispel and #Grantek - Engineer in a Box

Почему Азовское море — самое опасное в мире

Почему Азовское море — самое опасное в мире

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]