Pen Testing ICS and Other Highly Restricted Environments | SANS@MIC Talk

Subscribers:
64,200
Published on ● Video Link: https://www.youtube.com/watch?v=YrmRVNpuqWY



Category:
Guide
Duration: 1:07:09
3,579 views
66


"Congratulations, you have been selected to conduct a penetration test of our industrial control system (ICS) environment. Please remember, you cannot scan anything, you cannot install anything, and you cannot break anything. Your point of contact, who will watch every move you make, will be..." This is not a joke. More and more companies are requesting penetration tests of their ICS assets. But how can you conduct testing with these restrictions and provide actionable information to secure the customer's environments? This webcast will discuss how to scope and conduct this type of assessment. Attendees will walk away with the skills needed to safely evaluate critical networks and assets and make the customer's team comfortable about the assessment.

Speaker Bio
Don C. Weber, a SANS ICS instructor and founding member of the GIAC Ethics Council, has devoted himself to information security since 2002. He has extensive experience in security management, physical and information technology penetration testing, web assessments, wireless assessments, architecture review, incident response and digital forensics, product research, code review and security tool development. He is currently focusing on assisting organizations secure their business and ICS environments through program reviews, security assessments, penetration testing and training.




Other Videos By SANS Institute


2020-04-28What Students Are Saying About SANS Live Online - New SANS Training Platform
2020-04-23Secure Video Conferencing - What to Train Your Workforce On | SANS@MIC Talk
2020-04-21Learning From The Adversary: Automated Malware Analysis For The Win! | SANS@MIC Talk
2020-04-21Self-Compiling Malware | SANS@MIC Talk
2020-04-17C2 Matrix | SANS@MIC Talk
2020-04-14SANS Live Online - New Online Training Platform
2020-04-14Successful Infosec Consulting, Getting Clients Deep Dive | SANS@MIC Talk
2020-04-14Check out SEC573! More Python3! More Pywars! | SANS@MIC Talk
2020-04-10How Threats are Responding to COVID-19 | STAR Webcast
2020-04-09Take Back The Advantage - Cyber Deception for the Win | SANS@MIC Talk
2020-04-07Pen Testing ICS and Other Highly Restricted Environments | SANS@MIC Talk
2020-04-07Domain Password Auditing with the Cloud | SANS@MIC Talk
2020-04-07SANS Institute - Self Paced Online Training
2020-04-06ZOMG It's ZOOM! - Don't worry, it's safe. As long as you follow some rules. - SANS Webcast
2020-04-03What Every Pen Tester Needs to Know About ICS
2020-04-02Are You Certifiable? | SANS@MIC Talk
2020-04-01The Hackers Apprentice | SANS@MIC Talk
2020-03-31Pen Testing ICS and Other Highly Restricted Environments - SANS Pen Test HackFest Summit 2019
2020-03-31Stealth persistence strategies | SANS@MIC Talk
2020-03-27Attacking Serverless Servers: Reverse Engineering the AWS, Azure, and GCP Function Runtime
2020-03-25xHunt - An Anime Fan's Attack Campaign in the Middle East | STAR Webcast



Tags:
sans institute
information security
cyber security
cybersecurity
information security training
cybersecurity training
cyber security training
SANS@MIC
ICS
Pen testing
Industrial Control Systems