The SANS Institute reports it will have courses and panel discussions on the latest security strategies and solutions for industrial control systems (ICSs) at its ICS Security Training event on June 10-15 in Houston's Energy Corridor. This session is part of SANS' effort to help process engineers and security professionals with their ICS security concerns.
"Critical questions need to be answered, such as, 'If security strategies and solutions are failing to keep attackers out of Internet facing IT systems, how are we going to maintain the integrity and protect ICS?' We believe an essential piece of the response is to best develop engineers and security professionals to meet this challenge head on," says Michael Assante, SANS' project lead for ICSs.
The ICS Security Training event will feature in-depth, hands-on, technical courses led by SCADA experts. Benefits to be gained from attending include:
- Current information regarding SCADA and control system threats and how to best prepare to defend against them;
- Advanced security testing techniques that work in operational ICS environments;
- Networking with top individuals in the field of SCADA Security; and
- Take-home solutions that you can immediately put to use in your organization.
In addition, a special event from 12 noon to 8 p.m. on Monday, June 10, will include a keynote address, as well as a "What Works" panel discussion. Also, the following training courses will be taught on June 11-15:
- SCADA Security Training, with instructors Jonathan Pollet and Daniel Michaud-Soucy, is a five-day course that bridges the gap between SCADA engineers and IT security professionals. Students will be are taught how SCADA and telemetry systems work from the ground up with several hands-on exercises. The course dives deeper into system exploitation. And, after everyone has built their own SCADA system, the course rounds out this process by explaining how to defend these systems from similar threats.
- Pentesting ICS and Smart Grid, with instructor Justin Searle, will teach hands-on penetration testing techniques used to test embedded electronic field devices, network protocols, RF communications and controlling servers of ICS and smart-grid systems like PLCs, RTUs, smart meters, home area networks (HAN), smart appliances, SCADA, substation automation and synchrophasors. This course is structured around the formal penetration testing methodology created by the National Energy Sector Cybersecurity Organization Resource (NESCOR), which is U.S. Dept. of Energy project.
For more information about the ICS training event, including course descriptions, instructor bios, or to register, please visit www.sans.org/info/129600.