ICS Webcasts
SANS webcasts are live web broadcasts combining knowledgeable speakers with presentation slides. SANS offers several types of webcasts designed to provide valuable information and enhance your security education. View our upcoming calendar and register for SANS Information Security Webcasts today!
Dealing with Remote Access to Critical ICS Infrastructure
Speakers: Justin Searle
The SANS ICS Summit 2019 and What to Expect
Speakers: Robert M. Lee, Tim Conway and Michael Assante
A Sneak Peek at the New ICS410
Speakers: Justin Searle
Threat Management Made Easy: How to Protect Your ICS Network with Less Effort
Speakers: Dennis Murphy and Dean Parsons
Passive, Active or Hybrid Monitoring: What is the right choice for your ICS Network?
Speakers: Barak Perelman
ICS Active Defense Primer Part 2
Speakers: Kai Thomsen
ICS Active Defense Primer
Speakers: Kai Thomsen
Anatomy of the TRITON ICS Cyberattack
Speakers: Justin Searle and Phil Neray
When IoT Attacks - Understanding the Safety Risks Associated with Connected Devices
Speakers: Billy Rios
An Inside Look at the Newly Updated ICS515 Course
Speakers: Robert M. Lee
Certifying Cyber Personnel Who Protect the Electric Grid
Speakers: Tim Conway
Global Response and Industrial Defense (GRID) Certification - What ICS Defenders Need to Know
Speakers: Robert M. Lee
There's A Secure App for That: How to Mitigate Attacks Targeting Automotive Mobile Application's Communications
Speakers: Ben Gardiner and Colin DeWinter
The Four Types of Threat Detection for ICS Security
Speakers: Robert M. Lee
NotPetya, Dragonfly 2.0 & CrashOverride: Is Now the Time for Active Cyber Defense in ICS/SCADA Networks?
Speakers: Mike Assante and Phil Neray
ICS Cyber Security in The Real-World: Demonstrating Threat Detection and Mitigation In Industrial Networks
Speakers: Dana Tamir and Chris Grove
Hitting the Security Sweet Spot with Honeypots in ICS Networks
Speakers: Brent Huston
The Top 20 ICS Cyber Attacks And how to use them to improve IIoT and cloud security designs
Speakers: Tim Conway and Andrew Ginter
The 2017 State of Industrial Control System Security—Part 2: Protection, Prevention and Convergence
Speakers: Bengt Gregory-Brown, Doug Wylie, Katherine Brocklehurst, Erik Giesa and David Zahn
The 2017 State of Industrial Control System Security-Part 1: Personnel, Threats and Tools
Speakers: Bengt Gregory-Brown, Doug Wylie, Edgard Capdevielle and Ty Powers
CRASHOVERIDE - Detecting and Mitigating the Electric Grid Targeted Malware
Speakers: Mike Assante, Robert M. Lee, and Dan Gunter
IIOT and Megacities 2025
Speakers: Mike Assante and Andy Bochman
Exploring the Unknown ICS Threat Landscape
Speakers: Robert M. Lee, Ben Miller, and Mike Assante
Cybersecuring DoD ICS Systems
Speakers: Michael Chipley
Digital Ghost: Turning the Tables on Cyber Attacks in Industrial Systems
Speakers: Michael Assante and Robert Garry
Fight Advanced Persistent Threats in ICS with Applied Trickery
Speakers: Bryce Galbraith
The GICSP: A Cornerstone Certification
Speakers: Scott Cassity and Doug Wylie
Prioritizing the CIS Critical Controls for ICS: Learning from recent incidents
Speakers: Mike Assante, Tim Conway, and Walt Sikora
Practical ICS Cyber Security for the Process Industry
Speakers: James McGlone and Jim Gilsinn
Incorporating ICS Cybersecurity Into Water Utility Master Planning
Speakers: Jason Dely
Running a Better Red Team Through Understanding ICS/SCADA Adversary Tactics
Speakers: Robert M. Lee
Demystifying Cyber Attacks on ICS: How They Work and How to Use Engineered and Cyber Layer of Protections
Speakers: Bryan L. Singer, CISSP, CAP
ICS-Houston Security Briefing
Speakers:
Where Are We Now?: The SANS 2016 ICS Survey
Speakers: Derek Harp, Bengt Gregory-Brown, Arabella Hallawell, David Meltzer, Christopher Strand and Jason Trost
What we all need to learn from recent ICS incidents
Speakers: Mike Assante and Tim Conway
ICS Network Segmentation
Speakers: Brett Young and Dan Morrow
Learn to Trust Your Insecure ICS Networks
Speakers: Lisa Lorenzin and David Mattes
The Frankenstein Framework - Assembling the Pieces to Enhance ICS Security Without Creating a Monster
Speakers: Justin Opatrny
Analyzing the Ukrainian Power Grid Cyber-Attacks
Speakers: Jake Williams
Internet of Things (IoT) and Embedded Device Security Research - A Primer
Speakers: Billy Rios
Deconstructing the Reports of Iranian Activity Against the Power Grid and New York Dam
Speakers: Mike Assante, Robert M. Lee
Noise Matters in Every Industrial Control System
Speakers: Doug Wylie
How NERC and CIP are making a difference
Speakers: Tim Conway
Security Awareness Programs and NERC CIP
Speakers: Lance Spitzner and Tim Conway
NERC CIP: Hot Topics
Speakers: Tim Conway and Ted Gutierrez
Hacking the Hospital
Speakers: Billy Rios
ICS Cybersecurity: Models for Success
Speakers: Michael Assante and Robert M. Lee
Car Wars Episode I: Hacker Menace
Speakers: Mike Assante and Matthew Carpenter
CIP V6 NOPR What You Need to Think About
Speakers: Mike Assante and Tim Conway
Cyber Security Strategies: Protecting Your ICS Investments a discussion with Ultra-3eti and Mike Assante of SANS
Speakers: Michael Assante and Alex Tarter, Ph.D.
The Sliding Scale of Cyber Security
Speakers: Robert M. Lee
Onboarding the ICS Mindset into Cyber Security Controls
Speakers: Jason Dely
APTs in ICS - Understanding and Preparing for the Rising Threat Landscape in Critical Infrastructure
Speakers: Mike Assante and Del Rodillas
Challenges and Strategies for Addressing the NERC CIP Version 5 Training Requirements
Speakers: Michael Assante, Tim Conway, and Ted Gutierrez
The State of Security in Control Systems Today: A SANS Survey Webcast
Speakers: Derek Harp, Adam Meyer and Ted Gary
Implementing an ICS Active Defense Strategy
Speakers: Robert M. Lee
Achieving ICS Network Security Monitoring and Visibility with Flow Data
Speakers: Robert M. Lee and Chris Sanders
Protecting Critical Infrastructure by Transforming Threat Intelligence into an Effective Defense
Speakers: Mike Assante and Mark Trump
Demystifying Targeted Attacks on Industrial Control Systems
Speakers: Scott King, Graham Speake, and Eric Cornelius
Advanced ICS Cybersecurity: Moving Beyond Defense in-Depth to an Intelligence-Driven Approach
Speakers: Mike Assante, Rich Mahler, and Rob Michael Lee
An Overview of ICS 515 - Active Defense
Speakers: Rob M. Lee
Cyber Security Metrics and Measuring Vulnerability
Speakers: Chandler Comerford Co-Presenters: Dr. Andrew Woodward and Peter Hannay
Industrial Control Systems Security Briefing
Speakers:
Designing and Implementing a Honeypot on a SCADA Network
Speakers: Charlie Scott, Master's Degree Candidate - Masters Presentation
Defending ICS Against Cyberthreats with Next Generation Security
Speakers: Michael Assante, Del Rodillas
SANS Securing The Human for ICS Engineers
Speakers: Michael Assante
Cybersecuring DOD ICS Systems
Speakers: Michael Chipley, PhD PMP LEED AP BD +C GICSP
ICS Attack Surfaces
Speakers: Dr. Eric Cole
Improving Security Through IT/OT Collaboration
Speakers: Graham Speake
Building an ICS Security Program: Where to Begin
Speakers: Michael Assante
Results of the SANS SCADA Security Survey
Speakers: Matt Luallen, Markus Braendle, Walter Sikora, and Mark Seward
Traditional Attack Motives must be Tailored for the ICS World
Speakers: Pat Combs, Schneider Electric
Understanding Control System Cyber Security
Speakers: Matt Luallen
Why Every CSO Needs to Know Industrial Control Systems (ICS)
Speakers: Billy Rios, Cylance
Why Every CSO Needs to Know Industrial Control Systems (ICS)
Speakers: Billy Rios
ICS Component Security Testing - Field Devices
Speakers: Justin Searle
ICS Component Security Testing - Field Devices (Singapore)
Speakers: Justin Searle
SANS Industrial Control Systems Security Briefing - Live from Houston, TX
Speakers: Mike Assante, President & CEO of NBISE; Lior Frenkel, Co-Founder & CEO, Waterfall Security Solutions; Bart Pestarino, Codenomicon and Jonathan Knudsen, Principal Systems Engineer, Codenomicon
Absence of the Normal, Presence of the Abnormal
Speakers: Tim Harwood
Prioritizing Security Resources
Speakers: Eric Cornelius
ICS/SCADA Honeypot Pros & Cons
Speakers: Brent Huston
Industrial Control System (ICS) Cybersecurity Response to Physical Breaches - A How-To Guide
Speakers: Michael Assante