October 26, 2023 at 10:39AM
Insights from the ICS Cybersecurity Conference highlighted the value of applying cybersecurity techniques and penetration testing used in weapons systems to secure industrial control systems (ICS) and operational technology (OT). Vulnerabilities such as poorly secured connectivity and outdated software were identified during penetration testing on weapons systems. Cybersecurity techniques for supply chain risk management and system configuration were also discussed.
Key takeaways from the meeting notes:
– The ICS Cybersecurity Conference discussed the application of cybersecurity techniques used in weapons systems to secure industrial control systems (ICS) and operational technology (OT).
– Brian Schleifer and Jon McEllroy presented insights on the topic at the conference.
– Vulnerabilities and techniques for securing weapons systems can be applied to other cyber-physical systems.
– Issues such as maintenance shells, insecure wireless connectivity, outdated software, and hardcoded credentials were identified during penetration testing on weapons systems.
– Cybersecurity techniques for supply chain risk management, digital engineering, system configuration, modular systems, and cyber hygiene can be used to secure OT.
– The meeting included discussions on other related topics such as China’s hackers in US critical infrastructure and support for secure PLC coding by vendors.