Gaining Endpoint Log Visibility in ICS Environments - SANS ICS Security Summit 2019

Subscribers:
64,000
Published on ● Video Link: https://www.youtube.com/watch?v=7B1cbfpNZok



Category:
Vlog
Duration: 36:55
816 views
17


Presenter: Michael Hoffman, Principal ICS Security Engineer, Shell

This presentation will discuss the reasons why it is important to gain visibility of logs on industrial control system endpoint devices, and examine different methods to achieve that visibility. We’ll review different architectures and technology constraints involved in moving those logs to centralized IT/OT Security Information and Event Management from an oil and gas perspective.

SANS Summit schedule: http://www.sans.org/u/DuS

The annual ICS Security Summit brings together practitioners and leading experts to share ideas, methods, and techniques for defending control system environments. In-depth presentations and interactive panel discussions deliver real-world approaches that work and make a difference for the individuals fighting this fight every day.




Other Videos By SANS Institute


2019-10-30How to Build Your Own Escape Room | SANS Security Awareness Summit
2019-10-30Online Digital Scavenger Hunt: Engaging Security Awareness | SANS Security Awareness Summit
2019-10-30Latest Techniques in Hacking the Human | SANS Security Awareness Summit
2019-10-28What's it like being a SANS instructor
2019-10-28What sets SANS apart from other cyber security training providers
2019-10-02Classifying Evil: Lessons from Hunting Human Traffickers | SANS Threat Hunting & IR Summit
2019-09-23Top 10 Writing Mistakes in Cybersecurity and How You Can Avoid Them
2019-08-27SANS Pen Test HackFest Summit & Training 2019: Sneak Peek
2019-08-15What you need to know about SEC555: SIEM with Tactical Analysis
2019-08-14ATT&CKing Your Enterprise: Adversary Detection Pipelines & Adversary Simulation
2019-08-14Gaining Endpoint Log Visibility in ICS Environments - SANS ICS Security Summit 2019
2019-08-14What you need to know about SEC530: Defensible Security Architecture and Engineering
2019-08-13What you need to know about SEC503: Intrusion Detection In-Depth
2019-08-12What you need to know about SEC487: Open-Source Intelligence (OSINT) Gathering and Analysis
2019-08-06Preventing Your Physical Access Control System from Being Used Against You - SANS ICS Summit 2019
2019-07-31Practical Solutions to Supply Chain Attacks - SANS ICS Security Summit 2019
2019-07-30Network Flow Data: A Cornucopia of Value - SANS Blue Team Summit
2019-07-24Scanners, Tunnels, and Sims, Oh My! - SANS ICS Security Summit 2019
2019-07-23Zero-Trust Networks: The Future Is Here - SANS Blue Team Summit 2019
2019-07-22Threat Hunting via Sysmon - SANS Blue Team Summit
2019-07-17Creating a Security Metrics Program: How to Measure Success - SANS ICS Security Summit 2019



Tags:
sans institute
information security
cyber security
cybersecurity
information security training
cybersecurity training
cyber security training
SANS Summits
Industrial control systems
ICS security
SCADA security