Prioritizing OT Security Efforts: The Five Tactical Things to Accomplish | SANS@MIC Talk

Subscribers:
64,200
Published on ● Video Link: https://www.youtube.com/watch?v=yj2oPse9HV8



Duration: 52:27
395 views
8


Small to Medium size businesses with OT environments are realizing they need a plan to protect their process networks. SANS recommends considering using the NIST Cyber Security Framework to outline and implement a security program designed to the OT network's requirements. But what do the process engineers, programmers, field technicians, programmers, and IT staff do in the meantime?

This talk will cover the five tactical things an OT/IT team can do while leadership defines the direction of a security program for the OT environment. It will discuss quick wins that can be accomplished with equipment typically already deployed. These steps will also provide the leadership team with valuable information that will help prioritize future efforts and quickly improve vendor / integrator / MSP requirements for near-term greenfield and upcoming brownfield maintenance projects.

Speaker Bio

Don C. Weber has devoted himself to the field of information security since 2002. He has extensive experience in security management, physical and information technology penetration testing, web assessments, wireless assessments, architecture review, incident response and digital forensics, product research, code review, and security tool development. He is currently focusing on assisting organizations secure their business and Industrial Control System environments through program reviews, security assessments, penetration testing, and training.

Don's past experiences encompass a wide variety of responsibilities. Senior manager of the incident response team and acting Director of the vulnerability / risk management program for a large media organization. Senior security consultant for a boutique security consultancy where he focused on penetration testing, hardware analysis, and wireless research of ICS technologies used in the energy sector. Senior consultant for an emergency response team providing incident response and forensic services to large, international corporations.




Other Videos By SANS Institute


2020-06-16A Walk Through Logs Hell | SANS@MIC Talk
2020-06-12Shellcode Analysis 101 | SANS@MIC Talk
2020-06-09SANS Live Online Interactive Remote Lab and Range Demo – SEC599: Defeating Advanced Adversaries
2020-06-09SANS Live Online Interactive Local Lab Demo – FOR508: Advanced Incident Response
2020-06-09SANS Live Online Interactive Live Lab Environment Demo: Slack, Local and Remote Lab Demonstrations
2020-06-09CYA by Using CIA -- Correctly For a Change | SANS@MIC Talk
2020-06-09Remote Forensic Investigations in the Context of COVID-19 | SANS@MIC Talk
2020-06-05Waiting for a cyber range exercise is not enough | SANS@MIC Talk
2020-06-03Case Study: Airbus
2020-06-02WinSCP: Yeah you know me! | SANS@MIC Talk
2020-05-28Prioritizing OT Security Efforts: The Five Tactical Things to Accomplish | SANS@MIC Talk
2020-05-28Introduction to Docker for security work | SANS@MIC Talk
2020-05-27Threat Hunting and the Rise of Targeted eCrime Intrusions | STAR Webcast
2020-05-21Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk
2020-05-20Find_Evil - Threat Hunting | SANS@MIC Talk
2020-05-18Tricking modern endpoint security products | SANS@MIC Talk
2020-05-18Modern Domain Deception - The risk, issues and potentiality | SANS@MIC Talk
2020-05-14Cloud Native Payloads: A Matryoshka Doll of Exploits | SANS@MIC Talk
2020-05-14Incident Response in ICS in times of Lockdown | SANS@MIC Talk
2020-05-13SANS – Your Source for Cybersecurity Training – Live Online
2020-05-12Coalfire penetration testers charged with criminal trespass | SANS@MIC Talk



Tags:
sans institute
information security
cyber security
cybersecurity
information security training
cybersecurity training
cyber security training
OT Security