Industrial Control Cybersecurity USA 5th annual Conference | Detect Respond Recover. Mitigating cyber impact on physical safety systems

Demonstrating Level 0 and 1 device Vulnerability

We don’t need to look very hard to find recent reminders of either the fact that ICS have become a prime target and the sophistication of those who seek to attack them. We now face threat actors developing means of attacking specific components that are all but ubiquitous across connected ICS in certain critical infrastructure. Many level 0 and 1 devices are designed to allow two-way data exchange with SCADA or cloud systems. Recent attacks have demonstrated how vulnerabilities could be exploited to send false information to operators or directly manipulate processes leading to loss of safety, economic loss and possibly cause catastrophic damage. This presentation will highlight current vulnerabilities in OT devices and demonstrate the ways in which they could be exploited by an attacker.

  • Examples of key OT vulnerability and demonstration of potential attack paths
  • Why context matters – Identifying IoT devices, the applications they support and how they could be vulnerable to understand the severity of the risk
  • How anomaly detection in raw process data could provide an additional layer of security

profile picture

Andy Kling , Schneider Electric, Director of Cyber Security and Architecture

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.


Newsletter Text

Stay Up To Date On Everything The Cyber Senate Is Doing. Click Here To Sign Up For Our Newsletter Today!