What are your blind spots when it comes to protecting critical ICS from attacks that can impact production and safety? Compromising a Level 1 or 0 Industrial Control System (ICS) cyber asset is a not a difficult thing to do for someone with knowledge of industrial control systems.
Traditionally, industrial processing facilities have relied on security by obscurity, system complexity, air gapping, network segmentation, and perimeter-based security protection for process control networks (PCNs). Many organizations have put IT-centric security technologies in place that primarily focus on securing Level 3 and 2 systems within the PCN, such as operator systems and workstations.
This IT-centric approach fails to protect Level 1 and 0 production-centric assets sufficiently, thus leaving them vulnerable. This creates a huge blind spot, which leaves industrial processing facilities vulnerable to common ICS attack vectors.
This presentation provides an overview of two simple Level 1 and 0 attack vectors that challenge most industrial processing facilities to defend proactively against. It provides an in-depth examination of the thought processes used by an attacker, along with a detailed anatomy of each attack. It then discusses the required technical controls needed to defend against each type of attack.
Attendees will learn:- How an attacker approaches an ICS environment
- How two real-world attack vectors can lead to process and safety disruption as well as how to defend against them
- Security controls that protect against these two scenarios