Channel Avatar

SANS ICS Security @UCcA_TRQ5sLtFC3pAkaVot3Q@youtube.com

12K subscribers - no pronouns :c

SANS has joined forces with industry leaders and experts to


01:05:04
Part 3 - Ctrl+Alt+Comply: Application Provider Perspective
01:06:09
Part 5 - Ctrl+Alt+Comply: Cloud Services & CIP Standards – What are the compliance challenges?
01:11:06
Part 4 - Ctrl+Alt+Comply: Cloud Services & CIP Standards - Cloud Service Providers Perspective
01:02:25
Part 2 - Ctrl+Alt+Comply: NERC CIP in the Cloud - Regulated Electric Utility Perspective
01:08:51
Part 1 - Ctrl+Alt+Comply: NERC CIP in the Cloud - Introduction and Current State
03:22
ICS612: ICS Cybersecurity In-Depth
01:33
ICS515: ICS Visibility, Detection, and Response | GRID
02:16
ICS410: ICS/SCADA Security Essentials | GICSP
01:03
ICS Security Summit 2024 Highlights - Join us for the 20th Anniversary in 2025!
36:05
Machina Matrix: OT Security and Operations in Cyber Overdrive Building Operational Resilience
30:18
Is Your Operator Ready for a Cyber Attack?
35:15
Lessons Learned Building OT SOCs
31:54
Using ChatGPT to Write ICS/OT Defensive and Offensive Tools
28:55
FuxNet: The New ICS Malware that Targets Critical Infrastructure Sensors
27:05
One Team One Fight: How Vulnerability Collaboration Crushes Threat Actors Hopes and Dreams
30:10
Does Practice Make Perfect? Lessons Learned from Full-Scale Power System Incident Response Exercise
26:20
Answering the Big Question: Has My OT Been Compromised?
35:22
Journey to an OT SOC: Case Studies from Expanding Visibility
29:45
Hacking the Power Grid in a Virtual City – At Scale
01:12
An ICS/OT Cybersecurity Consultant's Experience with SANS ICS Security
01:34
Mission to Defend Critical Infrastructure | SANS ICS Security
58:26
Tactical Risk Reduction in ICS/OT Environments
57:35
Panel | We Hear You Cloud and Clear
28:59
Keynote | High Five: Top Trends in ICS
36:00
Managing Insider Threats | SANS ICS Concepts
36:47
NRECA RC3 Self-Assessment Tool | SANS ICS Concepts
29:44
Cyber Informed Engineering | SANS ICS Concepts
31:38
Live Demo: Don’t Say a Peep
26:49
A Cross-Sector Methodology for Ranking OT Cyber Scenarios and Critical Entities
22:35
Manufacturing Cybersecurity – Boots on the Ground and Back to the Basics
30:09
Combating Implicit Trust in West Texas Oil Field
33:11
Multiverse of Convergence: Charting IT/OT Threat Overlap
17:20
Orlando Utilities Commission Cyber Security and Efficient Management of Grid Edge Devices Project
28:37
Do We Have Logs for That? When Network Traffic Analysis Falls Short
29:44
Establishing Your Baseline
28:16
Harnessing the Power of Vital OT Endpoint Information for Security, Resilience and Performance
18:19
New Cyber-Physical Threats to Industrial Equipment
37:43
Delivering OT Security from Legislation to Harmonized Daily Business at Industrial Sites
30:36
How to Perform Effective OT Cyber Security Risk Assessments
30:39
ICS/OT Secure Remote Access
32:45
Building a Security Program for Operational Technology
22:01
Emulating Adversary Actions in the Operational Environment with Caldera OT
32:40
The Future of OT Security ... Happened in 2022 (and You Didn't Even Know It)
34:15
Testing Operational Effectiveness of Control 1 of Five SANS ICS Cybersecurity Critical Controls
42:13
The Risk to Space as Satellite Communications Systems and Ground Networks are Target for Attackers
30:43
Defending Critical Infrastructure During a War
34:12
Why Operating Technology Security is so Hard for Utilities
01:29
Join Us at SANS ICS Security Summit & Training 2023
09:11
Programming a PLC & HMI | ICS/SCADA Security Essentials Overview
01:05:41
The Five ICS Cybersecurity Critical Controls Webcast
04:38
ICS Network Traffic Capture Options: 5-Tuple & Full Packet | SANS ICS Security Brief
36:19
SCADA Protocol Implementation Considerations | SANS ICS Concepts
06:07
ICS Network Traffic Visibility: North/South vs East/West | SANS ICS Security Brief
04:40
ICS Network Security: SPAN vs. TAP | SANS ICS Security Brief
37:48
ICS410 and A&ECS | SANS ICS Concepts
09:18
Review of the Purdue Network Model | SANS ICS Security Brief
06:23
Essentials for Your ICS Incident Response Jump Bag | SANS ICS Security Brief
34:09
Discussing Forever-Day Vulnerabilities | SANS ICS Concepts
30:27
Case Study: Risks & Mitigations of 5G in Your ICS - Yohei Ishihara | SANS ICS Security Summit 2022
31:23
Secure It Right from the Start - Virginia Wright & Andrew Ohrt | SANS ICS Security Summit 2022