The Army's ICS and Its Defense

May 15, 2019 11:00 AM

The United States Army is a massive organization with an incredible number of diverse networks. These networks range from unclassified and classified business networks to industrial controls system (ICS) networks in critical infrastructure. As the team lead for one of the first cyber protection teams to attempt to tackle ICS security for the DoD I came across significant issues regarding tools, personnel (team composition, talent, retention, etc.), as well as typical organizational inertia. My team was able to overcome many of these challenges, but there are significant obstacles and opportunities for the larger community to tackle. This talk will elaborate on some of the defensive techniques used in ICS networks and how they differ from traditional IT networks, focusing on some of the challenges unique to ICS networks and military operations to secure them. Finally, a few of the United States Military Academy’s educational efforts in this field will be highlighted.

Speaker Information

Panelist Information

Raymond Blaine

U.S. Military Academy (USMA)

"Raymond Blaine is the Director of the Cyber Research Center at the U.S. Military Academy (USMA) at West Point. In this capacity he is responsible for leading specialized research programs in support of USMA, Army, and DoD requirements as well as teaching cyber security subjects in the USMA curriculum. Immediately prior to this, he spent three years leading one of the twenty Army defensive cyber protection teams (CPTs). He took his CPT from inception through the traditional cybersecurity training and certification by U. S. Cyber Command. He then led his team through specialized training in industrial control system (ICS) security. Ray received a BS from the U.S. Military Academy and an MS and Ph.D. from Vanderbilt University, all in electrical engineering. His Ph.D. focused on radiation hardened by design analog and mixed-signal microelectronic circuits. His research interests are in ICS security, data visualization for cyber security, and applied machine learning. "