Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Webinar Today: Top 5 Myths of ICS Cybersecurity – Debunked!

Webinar: The Top 5 Myths of ICS Cybersecurity – Debunked!

Webinar: The Top 5 Myths of ICS Cybersecurity – Debunked!

What are the top five ICS cybersecurity myths, and are they hindering you from securing your industrial process control environment?

Industrial control systems (ICS) are certainly under assault. There are numerous public examples – the most recent being the WannaCry ransomware attack that successfully penetrated process control networks and, in limited cases, slowed or shut down production. This attack was a wake-up call for industrial process industries as WannaCry exposed the immaturity of and misconceptions surrounding ICS cybersecurity strategies today.

Join us for a live webinar on June 14 at 1PM ET to hear from a panel of industry experts that will:

– Identify popular ICS cybersecurity myths that leave the systems that matter most in a facility vulnerable.

– Examine each myth and provide specific kill chain examples (including WannaCry) that expose these myths for what they are.

– Provide best practices that companies can adopt to help secure their ICS environments from both outsider and insider threats.

Register for Webinar

Speakers

Mike Assante – Director of Critical Infrastructure and ICS, SANS Institute 

Advertisement. Scroll to continue reading.

Mike Assante

Michael Assante currently manages the SANS Industrials and Infrastructure practice area and is the lead for the Industrial Control System (ICS) and Supervisory Control and Data Acquisition (SCADA) security curriculum. Previously he served as vice president and chief security officer of the North American Electric Reliability Corporation (NERC), where he oversaw industrywide implementation of cyber security standards across the continent. Before joining NERC, Mike held a number of high-level positions at Idaho National Laboratory and served as vice president and chief security officer for American Electric Power. His work in ICS security has been widely recognized.

Jason Howard-Grau – CISO, PAS Global, LLC 

Jason Howard-GrauJason Howard-Grau is the chief information security officer at PAS, Inc. Jason is a veteran technology leader with more than 22 years of cybersecurity and advisory experience within both operational and information technologies. Prior to joining PAS, Jason was the CISO at MOL Group, an integrated oil and gas company with operations in over 30 countries, where he owned and developed the company’s cybersecurity strategy. Prior to MOL Group, Jason held information technology (IT) leadership positions at both Burberry and Vodafone, where he was Global Head of Cyber Security Operations & Program Delivery. Previously, Jason was a Senior Advisor at KPMG focusing on IT and cybersecurity within the Financial Services, Petrochemical, and Telecommunication sectors.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

ICS/OT

Municipal Water Authority of Aliquippa in Pennsylvania confirms that hackers took control of a booster station, but says no risk to drinking water or...

ICS/OT

Mandiant's Chief analyst urges critical infrastructure defenders to work on finding and removing traces of Volt Typhoon, a Chinese government-backed hacking team caught in...

Cybercrime

Energy giants Schneider Electric and Siemens Energy confirm being targeted by the Cl0p ransomware group in the campaign exploiting a MOVEit zero-day.

ICS/OT

Wago has patched critical vulnerabilities that can allow hackers to take complete control of its programmable logic controllers (PLCs).

ICS/OT

Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.