Know Thyself Better Than The Adversary - ICS Asset Identification & Tracking This blog was written by Dean Parsons. As SANS prepares for the 2018 ICS Summit in Orlando, Dean Parsons is preparing a SANS ICS Webcast to precede the event, a Summit talk, and a SANS@Night presentation. In this blog, Dean tackles some common … Continue reading Know Thyself Better Than The Adversary - ICS Asset Identification and Tracking
In my time at SANS I have had the opportunity to work with an amazing group of ICS professionals, and helped to create some industry leading ICS courses as well as certifications. While we are always hard at work in helping our customers we are equally as focused on leveraging the opportunity that SANS … Continue reading What Will Your Attack Look Like?
The Frost & Sullivan research report on the global critical national infrastructure (CNI) cyber security market, coming out on the eve of the SANS European ICS Security Summit, highlights a number of key trends in this increasingly important field.
This post was written by Michael J. Assante, SANS ICS Director The history of cyber attacks is nearly as long and as brief as the history of interconnected digital technology. The concept of self-replicating or propagating programs was envisioned in the 70s and 80s. The first PC virus, called the Brain, was created in Pakistan … Continue reading Brief History of Cyber Attacks
FireEye uncovered a new piece of ICS malware that they released todayand their way of approaching it both to the public and in pre-briefing to the media has been outstanding. The malware is not in the wild, is not a threat to the industry, but offers lessons learned and I believe the FireEye/Mandiant team's handling … Continue reading IRONGATE Malware - Thoughts and Lessons Learned for ICS/SCADA Defenders