Videos Tagged with "SCADA"
August 20, 2012
Anthony M. Freed, from Infosec Island met up with James Arlen at the 2012 BlackHat Conference in Las Vegas to learn more about the differences between the two systems, how people view them, how to differentiate between the two, and what needs to happen in order for people and businesses to stay safe...
August 02, 2012
Everyone knows routers, switches and servers are connected to the internet - but what else is out there? Has anybody even looked? Some of Dan's Shodan findings were pretty surprising, and these discoveries are an excellent metric for identifying how successful our security campaigns as an industry are...
July 31, 2012
The "Power Grid" is a growing topic in the security industry and Advanced Metering Infrastructure (AMI) is a topic that hasn't been discussed to its full potential. Spencer's presentation discussed the types of vulnerabilities found in Smart Meters, and gave examples from real world assessments he conducted...
April 26, 2012
Watch the roundtable launch of the LIGHTS program from April 24. LIGHTS Chair Chris Blask opens with a presentation on major issues facing industrial facilities, then is joined by Energysec's Steve Parker, Joel Langill a.k.a. SCADAHacker, and AWWA's Kevin Morley and Gary Sturdavan...
April 09, 2012
Chris Wysopal discusses why it is so important to the power grid to write secure code for software, how computer intrusion methods have changed in over past two decades, the impact of data breaches on modern organizations, and the necessity for thorough testing prior to launch...
February 27, 2012
Amol Sarwate examined how SCADA security and advance persistent threats have now taken center stage. While the industry has some success in dealing with IT security, when it comes to industrial control systems or SCADA systems, it still has enormous challenges...
December 14, 2011
The first of a monthly webinar series on Industrial Control System (ICS) Cybersecurity is now available for review in this video. This session provides insight for those interested in ICS Cybersecurity including policy makers, asset owners, vendors, consultants and integrators....
Making Sense of Split Tunneling ... nat ravitz on 03-06-2014
The Target Breach: How Network Security Best... Barry Herne on 03-05-2014
Making Sense of Split Tunneling ... nat ravitz on 03-05-2014