icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons_061

Paul Asadoorian Speaking at 9th Annual SANS ICS Security Summit

Register for 9th Annual ICS Security Summit

March 18, 2014
12:00pm to 1:15pm
I will never forget my assignment for a vulnerability assessment against a control systems network. “Hey, can you go somewhere, run “scans” against this system, and oh by the way don’t crash it or a large portion of the USA could lose power”. Needless to say, I turned down that assignment, as they required that a traditional network-based “scan” be run. There has to be a better way to preform assessments in such environments! Fast forward 10 years later and I’ve worked with much safer techniques for assessing the security of SCADA/Control systems infrastructure. Working for Tenable Network Security has also provided me great insights into several techniques, including: - Using credentials to login to systems and audit for missing patches and configuration changes - Tuning vulnerability scans to be less intrusive yet still accurate and providing useful information - Implementing passive vulnerability scanning to discover hosts on the network and enumerate vulnerabilities, without sending a single packet to the end-user system

Location

Contemporary Hotel, 4600 North World Drive, Lake Buena Vista, FL 32830 US

Get Directions

Featured Events

Black Hat Europe 2016

November 1, 2016 to November 4, 2016

RSA Conference Abu Dhabi

November 15, 2016 to November 16, 2016

View more events