March 7, 2019 12:00 PM
There is a lot of hype around ICS network monitoring. This talk answers the question – how does this technology actually work and what can it actually do? We will review the technologies used to capture packets 24x7, network monitoring points for your architecture and the use cases that are enabled by analyzing a full packet capture in real-time on an ICS network.
Dennis started his career designing, installing and maintaining process automation networks 25 years ago. Most of his experience with SCADA systems was in the integration of data between the IT and OT networks. In 2005, he realized how security was more of an afterthought and shifted his focus to securing ICS networks. Now he is a network security monitoring (NSM) professional and uses this technology to help control system engineers and IT security professionals understand the impacts they have on the security of control system networks. Dennis focuses on providing practical solutions to meet national critical infrastructure cyber security requirements. His main interest is in bridging the gap between the information technology (IT) requirements and operational technology (OT) requirements.