Star 0

Abstract

This presentation will tackle both red teaming methodologies and threat modeling for industrial control system and the presenter will showcase security-in-depth where “air-gap” is not possible to implement within the organization to battle against both insider and cyber threats’ using sophisticated tools, techniques, and procedures.
Along with this, various industries best practices and compliance will be shared on this talk to ensure nothing will be miss-out in addressing the OT network security.
Key Take Away

Practical implementation of Defense-in-Depth for OT environment.
Learn the best practices in ICS/SCADA security.
Know the adversaries TTP’s through “Red Teaming”.