HideWarning

TV102: We're Secure -- We Have A Firewall!

 

 

May 2012 (5:42)

Many companies already use firewalls to isolate the plant and enterprise networks. What's so bad about this approach? Aren't these networks already protected?

 

In this video, we'll explore the types of cyber security issues we often see in plant networks and explains how these issues can impact plant operations in spite of these firewalls.

 

TV101: What Is Cyber Security?

 

 

May 2012 (6:19)

Using ANSI/ISA-99 Standards to Improve Control System Security

Today operators and engineers are under pressure to isolate automation systems at the same time as management is asking for greater interconnectedness. 

This White Paper explains how the “zone and conduit” model included in the ANSI/ISA-99 security standards provides a framework for helping deal with network security threats that arise from both the “push for productivity” and the fear of the next “Son-of-Stuxnet” worm.

Deep Packet Inspection for SCADA and Process Controls

Deep Packet Inspection for SCADA and Process Controls

May 2012 (2:59)

In this video, Eric Byres provides a quick tutorial on how Deep Packet Inspection provides a more thorough defense for Industrial Control Systems.

Virus Prevention Using Deep Packet Inspection

Virus Prevention Using Deep Packet Inspection

May 2012 (3:42)

In this video, Eric Byres provides a look at how viruses attack a PLC/HMI without Deep Packet Inspection via a USB memory stick.

SCADAhacker Demonstrates Attacking a Stateless Firewall

SCADAhacker Demonstrates Attacking a Stateless Firewall

 

 

April 2012 (14:58)

In this video, Joel Langill, SCADAhacker.com, demonstrates attacking a Stateless Firewall

 

In this video you will find out:

 

Control System Security in a Post-Stuxnet World

Control System Security in a Post-Stuxnet World

Using ANSI/ISA-99 standards to improve control system security

Article from: Industrial Ethernet Book, February 2012

Today, operators are being asked to isolate automation systems just as ever greater interconnectedness is demanded. Adding to these pressures is the growing fear of cyber attacks such as the infamous Stuxnet.

In this article Eric Byres explains how the ‘zone and conduit’ model included in the ANSI/ISA-99 security standards provides a framework for dealing with network security concerns, including fears of the " Son-of-Stuxnet".

7 Steps to ICS and SCADA Security

Cyber security threats, from sophisticated malware like Stuxnet, Night Dragon and Duqu, or from the publishing of an unprecedented number of security vulnerabilities, are causing a major disruption in the industrial automation market.

If you are a process control engineer, an IT professional in a company with an automation division, or a business manager responsible for safety or security, you may be wondering how your organization can get moving on more robust cyber security practices. 

Two industry veterans, Eric Byres and John Cusimano, combine industry standards, best practice materials, and their real-world experience to provide an easy-to-follow 7-step process for improved ICS and SCADA security.

Securing Industry from Cyber Threats

Securing Industry from Cyber Threats

 

October 2008 (4:06)

The Tofino Industrial Security Solution

The Tofino Industrial Security Solution

 

 

Tofino Security Demonstrates Industrial Control System (SCADA)

Tofino Security Demonstrates Industrial Control System (SCADA)

 

 

 

Tofino Live Demonstration

Tofino Live Demonstration

 

 

August 2009 (7:13)

Andreas Agostin demonstrates the Tofino Security Appliance.

 

Tofino Live Demonstration

 

 

Ralph Langner: Cracking Stuxnet, a 21st-century cyber weapon

Ralph Langner: Cracking Stuxnet, a 21st-century cyber weapon

 

March 2011 (10:41)

When first discovered in 2010, the Stuxnet computer worm posed a baffling puzzle. Beyond its unusually high level of sophistication loomed a more troubling mystery: its purpose.

 

Protecting Your ICS from Zero-Day Attacks

Protecting Your ICS from Zero-Day Attacks

AusCERT 2011: Ranking Australian Engineers on SCADA Security

AusCERT 2011: Ranking Australian Engineers on SCADA Security

AusCERT 2011: Eric Byres demonstrates SCADA protection

AusCERT 2011: Eric Byres demonstrates SCADA protection

Stuxnet: Anatomy of a Computer Virus

Stuxnet: Anatomy of a Computer Virus

 

 

June 2011 (3:21)

An infographic dissecting the nature and ramifications of Stuxnet, the first weapon made entirely out of code. This was produced for Australian TV program HungryBeast on Australia's ABC1.

 

HUG TV: Boyes and Byres Talk Cybersecurity

HUG TV: Boyes and Byres Talk Cybersecurity

Digital danger zone: Tackling cyber security

Article from: arabianOilandGas.com, Utilities-me.com, January 2012

The protection of critical national infrastructure has long been a serious concern to governments in the Middle East.  Achieving this is no longer to limited to physical security; it now includes the very real and growing need to enhance cyber security.

Pages

Subscribe to RSS - HideWarning