Introduction
  • Introduction
What is ICS/SCADA?
  • What is ICS/SCADA?
ICS/SCADA Architecture
  • ICS/SCADA Architecture
ICS/SCADA Software Examples
  • ICS/SCADA Software
ICS/SCADA Protocols
  • ICS/SCADA Protocols
ICS/SCADA Security Standards/Guidance
  • ICS/SCADA Security Standards/Guidance
Why does ICS/SCADA need to be defended?
  • Why does ICS/SCADA need to be defended?
ICS/SCADA Threat Landscape
  • ICS/SCADA Threat Landscape, various ICS/SCADA threat activity events.
ICS/SCADA Attack Surfaces
  • ICS/SCADA Attack Surfaces intro, Hardware, Backdoors, Software, OS, Mobile.
  • ICS/SCADA How to defend yourself: Intro, Lab Setup, and Internet Research
ICS/SCADA: How to defend yourself
  • ICS/SCADA: How to defend yourself​ Network forensics & Ports & Services:
  • How to defend yourself​ Network forensics & Ports & Services: 2nd half
  • ICS/SCADA: How to defend yourself​ Network hardening:
  • ICS/SCADA: How to defend yourself​ Software:
  • ICS/SCADA: How to defend yourself​ Logging:
  • ICS/SCADA: How to defend yourself​ Internet facing & Rogue devices:
Final Words
  • Final Words