(ISC)2 Congress 2013: Rohyt Belani on securing SCADA within networks

(ISC)2 Congress 2013: Rohyt Belani on securing SCADA within networks

(ISC)2 Congress 2013: Rohyt Belani on securing SCADA within networks

Date: Sep 30, 2013

CHICAGO -- At the 2013 (ISC)2 Security Congress, SearchSecurity Editorial Director Robert Richardson spoke with Rohyt Belani, CEO of antiphishing security awareness vendor PhishMe Inc. Belani presented a session at the event that focused on a specific, highly targeted phishing attack that successfully penetrated an organization's network perimeter defenses. The attackers then proceeded, Belani said, to attack the domain controller for the network, and were clearly scanning port addresses commonly used by SCADA devices. Fortunately, the attack was detected and contained; Belani said SCADA controllers would otherwise have been easily compromised.

More on Vulnerability Risk Assessment

  • canderson

    How involved should execs be in software security programs?

    VIDEO - Video: Chris Wysopal of Veracode discusses how the role of security executives is evolving in application security and vendor management.
  • canderson

    The gaping hole in your vulnerability management program

    VIDEO - Authenticated vulnerability scanning may be just what your organization needs to complete its vulnerability management program. In this video, expert Kevin Beaver offers pointers for performing an authenticated vulnerability scan.
  • canderson

    How to make penetration test results matter

    VIDEO - Voodoo Security founder Dave Shackleford details how enterprises can make penetration test results more meaningful than a compliance exercise.
  • How to conduct proper AWS vulnerability scanning

    Tip - Vulnerability management in the cloud can be complicated. Expert Rob Shapland explains how to perform vulnerability scans in AWS under the shared responsibility model.
  • attack surface analysis

    Definition - An organization's attack surface includes all the exploitable vulnerabilities in its hardware, software, connections and even its employees, in the form of social engineering. Attack surface analysis allows the organization to detect those vulnerabilities.
  • Is the RSA 2015 'booth babe' ban a win for women in security?

    News - News roundup: The ban of "booth babes" at RSA Conference 2015 has been met with praise; does it equal an increase of women in infosec? Plus: Cyberthreat data-sharing bill advances; Flash flaw exploited days after patching; new twist on Google Play app vetting.

    ( Mar 27, 2015 )

  • Embedded systems security a growing concern amid rise of IoT

    News - As more devices become Internet-enabled, experts fear an embedded systems security worst-case scenario for enterprises, many of which are unaware of the risks or unable to mitigate them.

    ( Mar 23, 2015 )

  • Collaboration with Cloud Computing

    Feature - In this excerpt of Collaboration with Cloud Computing, author Ric Messier outlines how enterprises can evaluate risk management in the cloud.

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: