Displaying 1–25 of 26 results for SANS ICS

Sort By Relevance Sort By Date
1 2

SANS Control Security Training Coming to Houston

(News)

SANS Institute will hold ICS Security Training event on June 10-15 in Houston

More misleading ICS cyber security survey results

(Blog)

The Control Engineering 2015 Cyber Security Survey doesn’t seem to identify ICS cyber security impacts. The focus was on IT and networking devices with no mention of ICS field devices. A significant number of respondents experienced “cyber incidents” with their ICS networks – not devices. The ...

Infographic: Control Systems Are Cybersecurity Targets

(News)

This infographic demonstrates the many different ways attackers can gain access to an ICS environment and demonstrates the need for active security efforts and ICS engineer training that will enable informed engineering decision and reinforce secure behaviors when interacting with an Industrial ...

Protecting ICSs from Electronic Threats, Part 3

(Article)

IT Security Certification Exams Don't Address ICS Issues, and Professional Engineering Exams Don't Address Cybersecurity

ARC Advisory Group, SANS Institute to collaborate on cybersecurity education

(News)

The two organizations will address the need for new cybersecurity solutions for emerging smart cities, smart transportation and IIoT initiatives by performing joint research for a better understanding of cybersecurity awareness and preparedness.

The continuing cyber security gap between IT Security, Operations and ...

(Blog)

If so many people feel that ICS cyber security threats are so severe, why aren’t more end-users taking ICS-unique aspects of ICS cyber security more seriously and why aren’t more ICS experts involved?

Control system cyber security conferences are actually impacting control ...

(Blog)

There is a need for cyber security conferences for control system engineers that focus on control systems and control system impacts. OT network cyber security and OT network cyber security conferences are important but still leave a gaping hole - the control system devices.

Are spies or malware in our ICS networks– who is really looking?

(Blog)

I have been concerned for years that companies have been monitoring corporate networks and extrapolating those results to the ICS networks. I know of only a few companies that have actual monitoring data from their ICS networks. The results are certainly different than those on the corporate ...

Industrial control system (ICS) cyber incidents are not being identified or ...

(Blog)

Tripwire performed a critical infrastructure survey asking how long it would take to detect a breach. According to the survey, 86% of energy security professionals believe they can detect a breach in less than a week and 61% believe they can detect a critical system breach in less than 24 hours. ...

A Grim Gap: Cybersecurity of Level 1 Field Devices and lack of appropriate OT...

(Blog)

Getting networking and technical organizations to work together is critical, and one would think should be easy. Unfortunately “doughnut diplomacy” hasn’t worked and the gap between Engineering and IT/OT continues to exist and may even be growing. Monitoring the actual raw sensor data ...

Securing the Connected Value Proposition

(Article)

Security Is Job One in Realizing the Potential of the Connected Enterprise

Resource guide: cybersecurity cornucopia

(Article)

Our latest slate of articles, white papers, videos and other valuable resources come from ICEweb, Exida, ISA, and others.

Protecting Our Cyber Infrastructure

(Article)

Cyber-Covering Your Assets Is More Than Fending Off Terrorists, and That’s Not Good News

Why cybersecurity cannot be overlooked

(Article)

Effective cybersecurity requires ceaseless monitoring and evaluation of network data and traffic to identify and head off evolving intrusions and potential attacks, but improved tools are making it simpler and easier

Reader feedback: August 2018

(Article)

In August's Control reader feedback, readers respond to Joe Weiss' Unfettered blog as well as May's Ask the Experts "Polymer reactor level measurement", "Is it wise or dangerous to back up differential pressure with nuclear instrumentation?"

2019 S4 Conference – Observations and Challenges Especially for Engineering

(Blog)

Addressing the field device level requires engineering expertise and is what makes control system cyber security different than IT/OT cyber security. Automation/process/relay engineers, field instrument/relay technicians, etc. are not OT but Engineering whereas OT is the network engineers and ...

One answer as to why control systems are still so vulnerable

(Blog)

One reason control systems are still so vulnerable is the lack of understanding by IT security and the lack of participation in the control system security process by control system experts.

NIST Frameworks vs NERC CIPs

(Blog)

2018 RSA Conference observations and the dangerous lack of control system ...

(Blog)

Unfortunately, the culture gap between the control system and network security communities is alive and well. Our systems might stand a chance when this culture gap is surmounted and both communities work together to maintain reliability and safety.

Must See Web TV

(Blog)

Sort By Relevance Sort By Date
1 2