Connect with us

Hi, what are you looking for?



Webinar Today: Top 5 Myths of ICS Cybersecurity – Debunked!

Webinar: The Top 5 Myths of ICS Cybersecurity – Debunked!

Webinar: The Top 5 Myths of ICS Cybersecurity – Debunked!

What are the top five ICS cybersecurity myths, and are they hindering you from securing your industrial process control environment?

Industrial control systems (ICS) are certainly under assault. There are numerous public examples – the most recent being the WannaCry ransomware attack that successfully penetrated process control networks and, in limited cases, slowed or shut down production. This attack was a wake-up call for industrial process industries as WannaCry exposed the immaturity of and misconceptions surrounding ICS cybersecurity strategies today.

Join us for a live webinar on June 14 at 1PM ET to hear from a panel of industry experts that will:

– Identify popular ICS cybersecurity myths that leave the systems that matter most in a facility vulnerable.

– Examine each myth and provide specific kill chain examples (including WannaCry) that expose these myths for what they are.

– Provide best practices that companies can adopt to help secure their ICS environments from both outsider and insider threats.

Register for Webinar


Advertisement. Scroll to continue reading.

Mike Assante – Director of Critical Infrastructure and ICS, SANS Institute 

Mike Assante

Michael Assante currently manages the SANS Industrials and Infrastructure practice area and is the lead for the Industrial Control System (ICS) and Supervisory Control and Data Acquisition (SCADA) security curriculum. Previously he served as vice president and chief security officer of the North American Electric Reliability Corporation (NERC), where he oversaw industrywide implementation of cyber security standards across the continent. Before joining NERC, Mike held a number of high-level positions at Idaho National Laboratory and served as vice president and chief security officer for American Electric Power. His work in ICS security has been widely recognized.

Jason Howard-Grau – CISO, PAS Global, LLC 

Jason Howard-GrauJason Howard-Grau is the chief information security officer at PAS, Inc. Jason is a veteran technology leader with more than 22 years of cybersecurity and advisory experience within both operational and information technologies. Prior to joining PAS, Jason was the CISO at MOL Group, an integrated oil and gas company with operations in over 30 countries, where he owned and developed the company’s cybersecurity strategy. Prior to MOL Group, Jason held information technology (IT) leadership positions at both Burberry and Vodafone, where he was Global Head of Cyber Security Operations & Program Delivery. Previously, Jason was a Senior Advisor at KPMG focusing on IT and cybersecurity within the Financial Services, Petrochemical, and Telecommunication sectors.

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...


The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...


Wago has patched critical vulnerabilities that can allow hackers to take complete control of its programmable logic controllers (PLCs).


Cybersecurity firm Forescout shows how various ICS vulnerabilities can be chained for an exploit that allows hackers to cause damage to a bridge.


More than 1,300 ICS vulnerabilities were discovered in 2022, including nearly 1,000 that have a high or critical severity rating.


Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.

Cybersecurity Funding

Internet of Things (IoT) and Industrial IoT security provider Shield-IoT this week announced that it has closed a $7.4 million Series A funding round,...


Siemens and Schneider Electric address nearly 100 vulnerabilities across several of their products with their February 2023 Patch Tuesday advisories.