Building a Secure OT Network | SANS ICS Concepts

  Рет қаралды 23,646

SANS ICS Security

SANS ICS Security

Күн бұрын

In this concept overview, we are joined by Don Brown Associate Director of Cyber Security at Verista. Don is here to discuss his experiences deploying a security OT network architectures. He walks us through a presentation that outlines his approach to achieving good zones and conduits to implement a reliable and secure operating environment.
If you enjoy this video, and the topics we cover in the SANS ICS concept overviews, be sure to like and subscribe to this channel. Leave a comment if you have a question about this topic or suggestions for future content.
Script by Don C. Weber (@cutaway), Certified SANS Instructor and Cutaway Security, LLC and Don Brown Associate Director of Cyber Security for Verista.
References
Don C Weber's Social Media:
Twitter: / cutaway
LinkedIn: / cutaway
Cutaway Security: / cutaway-security-llc
CutSec Twitter: / cutawaysecurity
Don Brown's Social Media:
Email: don.brown@verista.com
LinkedIn: / donfbrown
Verista's Social Media:
Website: verista.com/
Email Contact Page: verista.com/contact/
Twitter: / verista10
Instagram: / verista1020
LinkedIn: / veristasolutions
SANS ICS Training:
ICS410: ICS/SCADA Security Essentials - www.sans.org/cyber-security-c...
ICS418: ICS Security Essentials for Managers - www.sans.org/cyber-security-c...
ICS456: Essentials for NERC Critical Infrastructure Protection - www.sans.org/cyber-security-c...
ICS515: ICS Active Defense and Incident Response - www.sans.org/cyber-security-c...
ICS612: ICS Cybersecurity In-Depth - www.sans.org/cyber-security-c...

Пікірлер: 11
@Pirate35able
@Pirate35able Жыл бұрын
Thank you for this video I am starting my first class in the IT realm and this video is helping me understand things much clearer.
@sultanmo9631
@sultanmo9631 10 ай бұрын
this is amazing! thank you very much!!
@rodneydias9586
@rodneydias9586 3 ай бұрын
Great, thanks
@PhilpotWildman
@PhilpotWildman Жыл бұрын
Excellent info!
@Pysky64
@Pysky64 9 ай бұрын
Awesome video
@Kissdaboss
@Kissdaboss Жыл бұрын
Very informative
@tejasdrama4639
@tejasdrama4639 2 жыл бұрын
Good One, Practical One, Thanks for your time sir. where to get the PPT ?
@akshaypotdar1840
@akshaypotdar1840 Жыл бұрын
Very informative, and interesting! Thanks, and much appreciated! If I could suggest a similar session on risk assement/ tolerable risk (IEC 62443-3-2) for future vidoes?
@joshuasanders6893
@joshuasanders6893 9 ай бұрын
Don't think he spoke about this but would you split up zones, like manufacturing, into sub-zones (vlans) that were protected by its own VRF to control east/west threat proliferation? Or is there little worry about 1 PLC somehow infecting another manufacturer PLC and instead the worry is a compromised PLC can then reach up to the SCADA server and it can then shut down everything. Just trying to figure out how flat or segmented we should make our networks.
@rikherlaar
@rikherlaar 2 жыл бұрын
This is a good starting point but in fact conduits are just firewall rules and you may need to enhance the OOTB capabilities of NGFW with extra insights from the likes of Claroty or Nozomi to make the inspection (controls) more accurate and offer a more astute level of detail - even if your FW has OT specific capabilities to recognize the more common protocols like Modbus and Profinet...you may not understand the flows and the involved risk - In terms of compartmentalization - your mileage may vary - some orgs. just isolate part of OT locally (containment of endpoints close to industrial estate) - other more integrated flows may need to be contained in VRF's mapping to zones for transport to datacenter or cloud based IT systems (warehouse management systems or ERP systems) etc. So it's a set of guiding principles and best current practices..to be implemented with respect to snowflake like use cases...
@justaddjeff1988
@justaddjeff1988 2 жыл бұрын
Good talk!
ICS410 and A&ECS | SANS ICS Concepts
37:48
SANS ICS Security
Рет қаралды 3 М.
The Purdue Model in OT security
9:59
OTbase
Рет қаралды 1,4 М.
Iron Chin ✅ Isaih made this look too easy
00:13
Power Slap
Рет қаралды 35 МЛН
НРАВИТСЯ ЭТОТ ФОРМАТ??
00:37
МЯТНАЯ ФАНТА
Рет қаралды 6 МЛН
Little girl's dream of a giant teddy bear is about to come true #shorts
00:32
How to Implement Network Segmentation in OT | Verve Industrial
59:09
Verve Industrial, A Rockwell Automation Company
Рет қаралды 3,4 М.
Network Architecture | SANS ICS Concepts
15:01
SANS ICS Security
Рет қаралды 12 М.
A Tale Of Two (Very Different) Secure ICS Architectures
26:08
S4 Events
Рет қаралды 4,5 М.
The Five ICS Cybersecurity Critical Controls Webcast
1:05:41
SANS ICS Security
Рет қаралды 5 М.
CrowdStrike IT Outage Explained by a Windows Developer
13:40
Dave's Garage
Рет қаралды 2 МЛН
How to Perform Effective OT Cyber Security Risk Assessments
30:36
SANS ICS Security
Рет қаралды 9 М.
Managing Insider Threats | SANS ICS Concepts
36:00
SANS ICS Security
Рет қаралды 2 М.
Introduction to OT / ICS Security - What You Need to Know
38:04
Prabh Nair
Рет қаралды 10 М.
Attacking ICS Devices - Threat Emulation with Conpot
36:22
John Hammond
Рет қаралды 15 М.
Industrial Control Systems - Understanding ICS Architectures
6:23
Mandiant (Part of Google Cloud)
Рет қаралды 26 М.
НОВЫЕ ФЕЙК iPHONE 🤯 #iphone
0:37
ALSER kz
Рет қаралды 247 М.
Я купил первый в своей жизни VR! 🤯
1:00
Вэйми
Рет қаралды 2,2 МЛН
Todos os modelos de smartphone
0:20
Spider Slack
Рет қаралды 62 МЛН
$1 vs $100,000 Slow Motion Camera!
0:44
Hafu Go
Рет қаралды 27 МЛН
Запрещенный Гаджет для Авто с aliexpress 2
0:50
Тимур Сидельников
Рет қаралды 235 М.