IIoT World Days Track – ICS Security: Bringing Order to ICS Cyber Chaos | SPONSORED
This track, originally presented at IIoT World Days on July 1, 2020, covers 5 presentations from industry leaders in ICS Security:
- ICS Security Bringing Order to ICS Cyber Chaos
- Addressing the Business and Cyber Security Challenges on the New Industrial 4.0 Convergence
- Creating and Performing a Cybersecurity Tabletop Exercise
- CMMC, the Department of Defense’s new Cybersecurity Standard
- Best Practices and Strategy for ICS Cybersecurity
ICS Security Bringing Order to ICS Cyber Chaos
A Cyber Resiliency Maturity Model (CRMM) is shared, including a prioritized roadmap of use cases when it comes to securing the most critical infrastructure and assets. Presented by Matt Morris, Managing Director & Business Head for 1898 & Co.’s Critical Infrastructure Cybersecurity & Risk Management Practice.
Addressing the Business and Cyber Security Challenges on the New Industrial 4.0 Convergence
This presentation covers: Threats landscape – IT and ICS specific threats; business and technical challenges in the ICS environment; What’s the risk in OT and why is OT security important?; and ICS security available solutions.
Presented by Richard Ku, Sr. VP, Commercial IoT Business & Market Development at Trend Micro.
Creating and Performing a Cybersecurity Tabletop Exercise
There are several phases to a successful tabletop exercise, which provides an opportunity for an organization to test contingency plans. These plans may address a variety of challenges which face an organization, e.g. weather, terrorism, cyber incidents, insider threat, or a natural disaster. There are multiple levels of contingency plans, including incident response plans, emergency evacuation plans, business continuity plans. This presentation focuses on developing and implementing a cybersecurity exercise. Presented by Kevin Owens, Co-Founder/CTO at Control Cyber.
CMMC, the Department of Defense’s new Cybersecurity Standard
CMMC is an umbrella standard encompassing many existing cybersecurity frameworks bringing them into a model closely paralleling the well known Capability Maturity Model and ISO 9000 Standards. CMMC contains 219 distinct practices and 153 processes across 18 domains. This presentation discusses how CMMC came to be, an overview of the 18 domains, what these requirements mean to defense contractors, and how this standard may become the standard across all government contracts. Presented by Michael Ritchie, Founder of Assurity Group.
Best Practices and Strategy for ICS Cybersecurity
This presentation discusses: The fatal flaw in location-based protocols; Best practices for securely connecting ICS; The new strategy for cyber security; and Why the new strategy needs to be adopted for ICS and connecting OT ‘things’ in an IT way. Presented by Jeff Hussey, President and CEO of Tempered.