In this webinar, you will hear about penetration testing techniques used to test individual components of a control system, including embedded electronic field devices, network protocols, RF communications, Human Machine Interfaces (HMIs), and various forms of master servers and their ICS applications.
Hear about how to apply these techniques directly to systems such as the Smart Grid, PLCs, RTUs, smart meters, building management, manufacturing, Home Area Networks (HAN), smart appliances, SCADA, substation automation, synchrophasors, and even IoT.
Date: Wednesday 1 July 2020
Time: 12:30 – 13:30
Anyone interested in protecting and securing OT & ICS systems.
- Attendees will hear about the steps and methodology used in performing penetration tests on OT & Industrial Control Systems and Industrial Internet of Things
- Attendees will hear about the techniques used to identify vulnerabilities in web applications
- Attendees will hear about exploits in hardware, network, serial, user interface, RF, and server-side vulnerabilities
About the Presenter
Justin Searle specializing in ICS security architecture design and penetration testing. He led the Smart Grid Security Architecture group in the creation of NIST Interagency Report 7628 and has played key roles in the Advanced Security Acceleration Project for the Smart Grid (ASAP-SG), National Electric Sector Cybersecurity Organization Resources (NESCOR), and Smart Grid Interoperability Panel (SGIP).
Justin has taught courses in hacking techniques, forensics, networking, and intrusion detection for multiple universities, corporations, and security conferences. He is currently a Senior Instructor for the SANS Institute and a faculty member at IANS. In addition to electric power industry conferences, Justin leads prominent open source projects including the Control Thing Platform, Samurai Web Testing Framework (SamuraiWTF), Samurai Security Testing Framework for Utilities (SamuraiSTFU). He has an MBA in International Technology and is a CISSP and SANS GIAC certified Incident Handler (GCIH), Intrusion Analyst (GCIA), Web Application Penetration.