Look Around and Find Out – How to Use OSINT to Protect Your OT/ICS Environment

OVERVIEW

One thing is clear, an incident in an OT/ICS environment affects everyone in almost every industry. If you have read or followed any cybersecurity framework, guidance, best practices, or document that directs you how to protect your organization from an incident or breach, typically you will always find something around understanding or knowing your assets. The same guidance is important in OT/ICS environments as well. This presentation will introduce the world of OT/ICS assets, device, and network discovery using OSINT (Open-Source Intelligence) tools and techniques in order better understand your OT/ICS attack surface. While this talk will focus mainly on the OT/ICS attack surface discovery, this presentation will also point out how some of these OSINT tools and techniques can be modified to understand the IT environment attack surface. Attendees of this presentation will be able to walk away with a methodology, roadmap, and guidance that can be used to perform their own OSINT on their OT/ICS environment.

Presented By

Wesley Lee Headshot

WESLEY LEE

Senior Manager at Protiviti