What is Unique About a Control Systems Network?
March 29, 2018
This session will profile some of the strengths (yes there are some), weaknesses, opportunities and threats unique to the networks found in control system environments. The SWOT related to these networks (i.e. we CAN do things you can’t do in a traditional IT networks but also cannot do some traditional items that can be done in IT networks like scanning or end point interrogation)
This session will address questions to include: What are the largest technology gaps/holes in different types of environments? What are the network architectures, control system protocols (Modbus, ethernetIP, DNP3, Profinet, Bacnet)? What is the difference between SCADA, DCS, and Safety systems? Where and why are there IT/OT connections? What are the interconnect controls (firewalls, physical separation, unidirectional gateway technology)?
NOTE: This meetup has already taken place. Paid members are able to access the recorded content at https://cs2ai.org/resources/
Discussion Leader: Stuart Phillips
Mr. Phillips has over 25 years of experience in cybersecurity, networking, and unified communications. He has held leadership positions in sales, marketing, and product/program management for some of the largest vendors (Cisco, Polycom, and Avaya). Stuart has extensive experience with end users in the military, government and financial markets worldwide, covering all aspects of security. He completed his B.S. in Computer Science in California. After joining Cisco he held positions of leadership in IOS Engineering and then managed Cisco security marketing for the Asia Pacific while completing his MBA in Singapore. Later he founded and ran a subcontractor Santa Barbara Labs (SBL), for the U.S. Air Force through Lockheed Martin. SBL program managed a high-security lab for developing software models to optimize secure communications over highly degraded military satellite networks. At Unisys, Stuart is focused on security technologies adoption and transition in the industrial Internet of things. He is based in Thornton, Colorado.
Discussion Leader: Kevin Van Der Veen
Kevin brings expertise in Architecture, Design, and Implementation of robust and secure Process Control Networks. He has over 20 years’ experience in network engineering, of which 11 years have been in Oil and Gas and 7 in Cybersecurity. He Brings the following relevant experience:
-Network/Security Architect for Shell Downstream Global Process Control Domain (PDC) SecurePlant Cyber Security Project
-Network/Security Engineer for PDC Secure Plant Cyber Security Project for Asia Pacific Region
-Provide onsite and remote technical and risk/gap assessments. Integrate network and security solutions for Upstream and Downstream environments
-Define and Implement Global network architecture security standards
-Perform technical assessments including site maturity, review and compliance for: network and firewall architecture, access control, portable media, operating system security patching, event log management, anti-virus, backup & restore.
-Communication analysis for multiple systems such as: 3rd Party, Internet-Based services, OPC/PI collectors/nodes, HMI’s, Safety and Engineering Workstations, SCADA, DCS controllers, PLCs and RTU’s.
-Create designs for integration of security solutions at existing assets