About Session
Technical Level: Intermediate
Seats are limited, so be sure to register for the workshop when you register for the conference.
This training focuses on the dynamic nature of OT networks and how to improve visibility using practical, open-source tools. Participants will learn how to identify devices, map data flows, and spot blind spots in OT environments.
Technical hands-on session for security practitioners.
Participants should bring laptops capable of running Intel based virtual machines and Docker containers.
A lab environment will be provided as a pre-configured VM image or a cloud-based VM with RDP or browser-based access.
Minimum specs: 12GB RAM, 40GB free disk space, USB-C port for VM copy, and virtualization capability enabled in BIOS. VMware Player, Workstation, or Fusion are supported. Apple Silicon is not supported. Participants should have administrative access on their machines.
Part 1:
– Introduction to OT protocols and their characteristics
– Overview of open-source network security monitoring tools
– Lab: testing with selected set of OT Security Monitoring software