- Видео 223
- Просмотров 965 693
SANS ICS
США
Добавлен 6 май 2019
SANS has joined forces with industry leaders and experts to strengthen the cybersecurity of Industrial Control Systems (ICS). The initiative is equipping security professionals and control system engineers with the security awareness, work-specific knowledge, and hands-on technical skills they need to secure automation and control system technology. Watch our videos, listen to our webcasts, to learn as much as possible about ICS Security, OT security, NIST, NERC CIP, and more!
Mission to Defend Critical Infrastructure | SANS ICS Security
Find available training and join us in the mission to protect and defend critical infrastructure: www.sans.org/u/1ueD
About SANS Industrial Control Systems Security:
ICS cyber security is focused on protecting industrial systems and operational technology (OT) against accidental or intentional risks. The SANS ICS Security Curricula provides training courses focused on assessing and defending ICS/OT environments. The SANS Institute offers introductory to advanced hands-on cyber security training to OT and IT cybersecurity professionals and control system engineers by equipping them with the skills needed to safeguard critical infrastructure.
Join us in the mission to defend what makes, move...
About SANS Industrial Control Systems Security:
ICS cyber security is focused on protecting industrial systems and operational technology (OT) against accidental or intentional risks. The SANS ICS Security Curricula provides training courses focused on assessing and defending ICS/OT environments. The SANS Institute offers introductory to advanced hands-on cyber security training to OT and IT cybersecurity professionals and control system engineers by equipping them with the skills needed to safeguard critical infrastructure.
Join us in the mission to defend what makes, move...
Просмотров: 1 173
Видео
Tactical Risk Reduction in ICS/OT Environments
Просмотров 9546 месяцев назад
ICS/OT environments are production environments that are closely monitored and maintained by personnel experienced in that process. Their job is not to think like the "bad guy" or to be a cybersecurity expert. However, a little bit of knowledge goes a long way to protecting these production assets and the processes they support. This presentation will outline the key areas to review to gather a...
Panel | We Hear You Cloud and Clear
Просмотров 1776 месяцев назад
Many organizations who were not already leveraging cloud service provider solutions found themselves rushing to these capabilities in 2020 during the pandemic and there have been no signs of this cloud pursuit trend slowing down. In a similar way the ICS community finds itself looking to cloud enabled solutions to house process sensitive data sets, running non-real time applications in the clou...
Keynote | High Five: Top Trends in ICS
Просмотров 3366 месяцев назад
Throughout 2023 we have seen five trends continue to emerge as areas requiring greater attention within the ICS community. These five areas include: ICS Targeted Malware, Industrial Cloud Integration, Supply Chain Risk, ICS IR Maturity, and the ever increasing Regulation across various critical infrastructure. This talk will briefly highlight approaches being taken to address these concerns, im...
Managing Insider Threats | SANS ICS Concepts
Просмотров 1,7 тыс.8 месяцев назад
In this concept overview, we are joined by Kevin Lawrence and Phil Thome of Congnizant. Kevin, Phil, and I discuss the managing insider threat incident response. We discuss the challenges organizations face when dealing with insider threats and Kevin and Phil provides us details about how to prepare for these types of events. If you enjoy this video, and the topics we cover in the SANS ICS conc...
NRECA RC3 Self-Assessment Tool | SANS ICS Concepts
Просмотров 7089 месяцев назад
In this concept overview, we are joined by Dan Gerard the Chief Technology Officer for the Association of Illinois Electric Cooperatives. Dan joins us to discuss the RC3 Self Assessment risk analysis process. We talk about what the RC3 process is and how electrical cooperatives are using it when following the Cybersecurity Capability Maturity Model (C2M2) is too complex for their needs and team...
Cyber Informed Engineering | SANS ICS Concepts
Просмотров 1,6 тыс.9 месяцев назад
In this concept overview, we are joined by Ginger Wright of Idaho National Labs. Ginger joins us to provide an introduction into Cyber Informed Engineering. We discuss the role CIE in helping organizations identify and limit risk to within their control environments. We talk about where you can find resources, training, and we also touch on the difference between CIE and Consequence-Driven Cybe...
Live Demo: Don’t Say a Peep
Просмотров 56610 месяцев назад
SANS ICS Security Summit 2023 Live Demo: Don’t Say a Peep Speaker: Tim Conway, Senior Instructor, SANS Institute Jeffrey Shearer, Certified Instructor, SANS Institute Ransomware attacks have targeted and impacted hundreds of organizations around the world. These attacks have primarily focused on traditional IT business networks and have largely been driven by criminal actors seeking financial g...
A Cross-Sector Methodology for Ranking OT Cyber Scenarios and Critical Entities
Просмотров 55510 месяцев назад
SANS ICS Security Summit 2023 A Cross-Sector Methodology for Ranking OT Cyber Scenarios and Critical Entities Speaker: Danielle Jablanski, OT Cybersecurity Strategist, Nozomi Networks Critical infrastructure cyber protection correlates 16 different sectors with no way to actually compare a standardized metric from a municipal water facility in Wyoming to a large commercial energy provider in Fl...
Manufacturing Cybersecurity - Boots on the Ground and Back to the Basics
Просмотров 34210 месяцев назад
SANS ICS Security Summit 2023 Manufacturing Cybersecurity - Boots on the ground and back to the basics Speaker: Ian Frist, Cybersecurity Compliance Program Director, Corning Manufacturing companies have been left behind as ICS cybersecurity has advanced. The large players in the ICS/OT industry have been working to better secure their environments for years. Those organizations have covered the...
Combating Implicit Trust in West Texas Oil Field
Просмотров 26610 месяцев назад
SANS ICS Security Summit 2023 Combating Implicit Trust in West Texas Oil Field Speaker: Blake Gilson, Industrial Cybersecurity Ops Manager, ExxonMobil As Industrial Control System (ICS) cyber threats continue to grow in scale and sophistication the O&G industry must ensure the unique requirements of the Oil and Gas Unconventional development business are accounted for within cyber security prog...
Multiverse of Convergence: Charting IT/OT Threat Overlap
Просмотров 31110 месяцев назад
SANS ICS Security Summit 2023 Multiverse of Convergence: Charting IT/OT threat overlap Speaker: Bryson Bort, Founder & CEO, SCYTHE Timothy Schulz, Adversary Emulation Lead, SCYTHE Security is defined by the threat (our real world supervillains); resilience is the concrete result of your action (or inaction). And the threat is always changing across your multiverse. Which Spiderperson will you b...
Orlando Utilities Commission Cyber Security and Efficient Management of Grid Edge Devices Project
Просмотров 16910 месяцев назад
SANS ICS Security Summit 2023 Orlando Utilities Commission Cyber Security and Efficient Management of Grid Edge Devices Project Speaker: Bob Anderson, Communications Tech III , Orlando Utilities Commission Jim Atkins, Account Manager, Eastern Region North America, SUBNET Solutions Orlando Utilities Commission's (OUC) namesake is "the Reliable One" due to their ongoing commitment to providing OU...
Do We Have Logs for That? When Network Traffic Analysis Falls Short
Просмотров 41910 месяцев назад
Do We Have Logs for That? When Network Traffic Analysis Falls Short
Harnessing the Power of Vital OT Endpoint Information for Security, Resilience and Performance
Просмотров 18610 месяцев назад
Harnessing the Power of Vital OT Endpoint Information for Security, Resilience and Performance
New Cyber-Physical Threats to Industrial Equipment
Просмотров 36010 месяцев назад
New Cyber-Physical Threats to Industrial Equipment
Delivering OT Security from Legislation to Harmonized Daily Business at Industrial Sites
Просмотров 69410 месяцев назад
Delivering OT Security from Legislation to Harmonized Daily Business at Industrial Sites
How to Perform Effective OT Cyber Security Risk Assessments
Просмотров 7 тыс.10 месяцев назад
How to Perform Effective OT Cyber Security Risk Assessments
Building a Security Program for Operational Technology
Просмотров 74510 месяцев назад
Building a Security Program for Operational Technology
Emulating Adversary Actions in the Operational Environment with Caldera OT
Просмотров 1,6 тыс.10 месяцев назад
Emulating Adversary Actions in the Operational Environment with Caldera OT
The Future of OT Security ... Happened in 2022 (and You Didn't Even Know It)
Просмотров 70310 месяцев назад
The Future of OT Security ... Happened in 2022 (and You Didn't Even Know It)
Testing Operational Effectiveness of Control 1 of Five SANS ICS Cybersecurity Critical Controls
Просмотров 31910 месяцев назад
Testing Operational Effectiveness of Control 1 of Five SANS ICS Cybersecurity Critical Controls
The Risk to Space as Satellite Communications Systems and Ground Networks are Target for Attackers
Просмотров 33110 месяцев назад
The Risk to Space as Satellite Communications Systems and Ground Networks are Target for Attackers
Defending Critical Infrastructure During a War
Просмотров 37110 месяцев назад
Defending Critical Infrastructure During a War
Why Operating Technology Security is so Hard for Utilities
Просмотров 54010 месяцев назад
Why Operating Technology Security is so Hard for Utilities
Join Us at SANS ICS Security Summit & Training 2023
Просмотров 1,1 тыс.Год назад
Join Us at SANS ICS Security Summit & Training 2023
Programming a PLC & HMI | ICS/SCADA Security Essentials Overview
Просмотров 6 тыс.Год назад
Programming a PLC & HMI | ICS/SCADA Security Essentials Overview
The Five ICS Cybersecurity Critical Controls Webcast
Просмотров 4,6 тыс.Год назад
The Five ICS Cybersecurity Critical Controls Webcast
TARS??
"Suffering Succotash, Ebe Bedeen Bedeen, That's All Folks!"
Tears in my eyes, this is so funny. Whenever it feels like a given malapropism is a bit too on the nose or doesn't fit otherwise, there comes a line that's just solid gold moments after. <3
You had me at "howsomever"
Zero trust operations is where the jam’s at.
That was just lovely. 🎉
Show this to Congress, 3/4 will vote for it.
I am glad to hear that the foxes will be defeathered going forward. Because feathered foxes make me sneeze.
@3:48 I was shocked to see both Star Trek and Star Wars graphics on the screen at the same time. Worlds... Colliding!!!!!!
As an IT guy, I hear words that I understand but the way that they're combined doesn't make any sense lol
4:17 Oof. That was a bit rough.
Nothing will every match the OG.
Great, thanks
This dude is still very attractive for his age.
Not so much for my weight or height, however.
Layman’s terms! None of that inside bullshit jargon no one understands!
Tempest … LOL
5:04 "Gates Tracking Chips" hahaha great reference
We can achieve results that are plastic, spastic, and sinosynclastic.
Never knew they came out with the latest iteration! And here i am still using a regular old plumbus...😢 No wonder i never got the side fumbling under control....
"unresponsive to the needs of the average consumer". The perfect business.
When they start using AI, things are gonna be amazing.
U.s. compartment of offense
2:32 That look, where Laweys generalise makes the laugh upon my upbent.
TARS?
I am new to OT and securing these environments so this is very useful information explained quickly an simply. I just watched the video re the Purdue model in general and makes me ask if you are going to so North\South monitoring I assume the best practice is to do this on every boundary between the layers in the Purdue model? Similar question for East\West the best practice would be to monitor this at ever level?
This man is my hero, in a completely non encabulated kinda way of course.
I accept your unadulterated approbation!
@@mikekraft9669 🤣
This is the one that takes our jobs.
I'd love to learn more about the advanced dinglearm technology in particular, i would be so happy if you would make a video about it!
Weapon of Choice, Fatboy Slim! Hilarious!
But ive heard, theyve been working on an obese child slender man.
Look... I am so happy the industrial meme has continued.
Legend
Fantastic!! 🤣🤣🤣
What about the Lunar Wane shaft? Was it made redundent or covered by a new function?
The Master speaks. Bator??
This doesn’t work because the first one played serious, this one starts as a joke. What made the original great was it being presented as something real and all of us realizing it was nonsense.
Yes, but if we did this one the same way, it is the same joke. It would be redundant. This one honors the original and the fact that it was a joke. Also, this one was done for a client (SANS ICS) whereas the first one was done on a whim while in studio doing an actual video for AB.
@@mikekraft9669 whats the original?
Bro knows everything about nothing
And nothing about everything!
This man has done well for himself. 😅
50% of my success is due to my hair.
0:30 YES YOU ARE
This video got encabulated forsure 🥴
Man, the hyperencabulator looks a lot like the robots from the movie Interstellar.
High art.
High Frank!
This is what i imagine people hear when i tell them about my job.
I see a lot of side fumbling from that handsomerandsomehorepiperizer... 🤨📸
“Phenomenality” 😳😂😂
Weady
lol sans
I must have one! Now. Hopefully I can leverage enough capital and hit the ground running with my paradigm shift proposal. I know this is what’s best for our culture. I just know it!
Retainium based Cloud benders and a soc drawer 😅😅
Is this a rap
Real talk? They're so based for coming back for a sequel. Top shelf.