Armis Workshop: Anatomy of a Maritime Port Attack: Inserting into the Cyber Kill Chain to Prevent a PLC Takeover

The cyber kill chain is a series of steps that trace stages of a cyberattack from the early reconnaissance stages to the exfiltration of data. The kill chain helps us understand and combat ransomware, security breaches, and command and control takeover of critical infrastructure. But how can we identify malicious intrusions and where should we insert into the kill chain to remediate potential destructive behaviors when our OT environments are littered with IoT sensors, cameras, out of date and unpatched Windows machines, and the dreaded shadow connections to IT and the Internet?   Session topics include:

  • What does the Google Maps of your enterprise look like?
  • Why device scope matters
  • IT/OT convergence and Industry 4.0.
Speakers
Monday PM
S2b: 12:15 PM Track 4 (Oceans 11)