The use of IP-based networking for interconnecting control systems to traditional IT networks is becoming pervasive. Considering the cyber security implications when networking control systems using traditional IP-based infrastructure is very important due to the risks that can occur if networking is poorly designed . Presentation addresses the cyber security implications of utilizing IP-based interconnections. Due to the fragility of many industrial control systems and protocols, appropriate solutions to harden the security of IP-based networks will be emphasized through a review of network designs. Techniques to secure traditional IT networks will be compared to those needed to secure industrial networks. The pros and cons of adopting traditional IT security techniques with control systems will be addressed. Presentation provides practical knowledge to securing IP-based industrial control networks through the use of technical illustrations and demonstrations.
- There are differences in control systems and traditional IT systems.
- Control systems are a vital component for IT environments.
- Risks can be overcome with appropriate applying of security techniques.
About Leonard Jacobs
Leonard Jacobs is President/CEO of Netsecuris Inc., a Managed Cyber Defense and Incident Response Provider specializing in cyber security protections to businesses. He has 37 years of hands-on technology management experience including over 21 years in cyber security. He has spoken on many cyber security topics at conferences around the world. Leonard is considered an expert in Industrial Control System cyber security. He is currently studying for a MS degree in Cybersecurity Technology from University of Maryland; with graduation in December 2018. He holds a MBA degree from University of Phoenix, CISSP certification and Certified SCADA Security Architect certification from IACRB. He is an Instructor at the MN Cyber Range. He teaches cybersecurity certification exam prep courses at Metropolitan State University. He has participated as an advisor in two nationwide National Guard cybersecurity exercises. He has provided ICS cyber security training to many organizations and venues.