Explore advanced network security monitoring techniques for Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) environments in challenging scenarios. Delve into a comprehensive 38-minute conference talk from the Security Onion Conference 2016, presented by Robert M. Lee and Jon Lavender. Gain insights into common applications, the Purdue Model, and the reality of air-gapped systems. Examine the sliding scale of cybersecurity, midpoint sensors, and ICS-specific network security monitoring approaches. Analyze the Cyber Kill Chain and its ICS counterpart, with a focus on power grid vulnerabilities, remote control access, and safety systems. Investigate real-world case studies, including remote sites and Nordic wind farms, and learn from the Dragonfly attack. Enhance your understanding of ICS/SCADA security challenges and develop strategies to protect critical infrastructure against evolving cyber threats.
ICS - SCADA Network Security Monitoring in Difficult Scenarios