• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • About
    • Secure360
    • UMSA
    • Get Involved
  • Events
    • Secure360 2021
    • Student360
    • Past Events
      • 2020 Secure360 Twin Cities
      • 2020 Student360
      • 2019 Secure360 Twin Cities
      • 2019 Student360
      • 2018 Secure360 Twin Cities
      • 2018 Secure360 Wisconsin
      • 2018 Student360
      • 2017 Secure360 Twin Cities
      • 2017 Student360
      • 2016 TC Secure360 Conference
      • 2015 Secure360 Conference
      • 2014 Secure360 Conference
      • 2013 Secure360 Conference
        • 2013 Secure360 Conference Speaker Presentations
      • 2012 Secure360 Conference
  • For Sponsors
    • Secure360 Twin Cities
    • Student360 Sponsors
  • For Speakers
    • Secure360 Speaker Details
    • Student360 Speaker Details
  • Blog
  • Nav Social Menu

    • Facebook
    • LinkedIn
    • Twitter
    • Vimeo

Secure360

Why is SCADA Security an Uphill Battle?

This presentation combines original research on technical SCADA security challenges faced by organizations which manage critical infrastructure or industrial control systems. The session will identify avenues of attack and explain how critical infrastructures can be compromised. It will also provide mitigation strategies and security controls to secure against exploitation. The session will focus on real world examples of successful and not-so-successful implementations of security controls with SCADA systems. It will conclude with guidance on how control system owners can start implementing additional measures to get to an acceptable level of security. Attendees who are in charge of control system infrastructure will get insight on what worked and what did not for other organizations. Engineers who are in-charge of security for control systems will get a better technical insight of SCADA protocols and components. Attendees who are new to control systems will get an excellent overview of security complexities of control systems.

About Amol Sarwate

As Director of Vulnerability Labs at Qualys, Amol Sarwate heads a worldwide team of security researchers who analyze threat landscape of exploits, vulnerabilities and attacks. Sarwate’s team develops signatures for Qualys’ vulnerability management service. For the last 15 years Amol has developed security products like firewalls and vulnerability scanners at McAfee, Hitachi, i2 and other organizations. He presented his research on Vulnerability Trends, Security Axioms and SCADA security at many conferences, including, RSA, BlackHat, Hacker Halted, nullCon, Hack In Paris, BSides, HSNI and FS/ISAC. He regularly contributes to SANS @RISK and the SANS Top 20.

Primary Sidebar

Details

Wednesday May 15, 2013
11:00 AM - 12:00 PM
Room 2

Share this page

Share on Facebook
Facebook
Tweet about this on Twitter
Twitter
Share on LinkedIn
Linkedin
Buffer this page
Buffer
Email this to someone
email

Footer

Contact

For more information about UMSA events, contact: Marie Strawser

Email List Signup

Join our email list for monthly Secure360 news and updates!




Join our tradeshow email list for updates on sponsorship opportunities and upcoming exhibitor deadlines.

Sponsored by:
© 2021 Secure360. All rights reserved.