Pen Testing ICS and Other Highly Restricted Environments | SANS@MIC Talk
"Congratulations, you have been selected to conduct a penetration test of our industrial control system (ICS) environment. Please remember, you cannot scan anything, you cannot install anything, and you cannot break anything. Your point of contact, who will watch every move you make, will be..." This is not a joke. More and more companies are requesting penetration tests of their ICS assets. But how can you conduct testing with these restrictions and provide actionable information to secure the customer's environments? This webcast will discuss how to scope and conduct this type of assessment. Attendees will walk away with the skills needed to safely evaluate critical networks and assets and make the customer's team comfortable about the assessment.
Speaker Bio
Don C. Weber, a SANS ICS instructor and founding member of the GIAC Ethics Council, has devoted himself to information security since 2002. He has extensive experience in security management, physical and information technology penetration testing, web assessments, wireless assessments, architecture review, incident response and digital forensics, product research, code review and security tool development. He is currently focusing on assisting organizations secure their business and ICS environments through program reviews, security assessments, penetration testing and training.