{"id":3272,"date":"2025-06-11T15:04:00","date_gmt":"2025-06-11T13:04:00","guid":{"rendered":"https:\/\/insightevents.dk\/isc-cph\/?post_type=tec_session&#038;p=3272"},"modified":"2025-06-20T10:22:19","modified_gmt":"2025-06-20T08:22:19","slug":"2-4-testing-and-validation","status":"publish","type":"tec_session","link":"https:\/\/insightevents.dk\/isc-cph\/sessions\/2-4-testing-and-validation\/","title":{"rendered":"Testing and Validation"},"content":{"rendered":"<ul>\n<li>\u2022 Methodologies for testing firewall configurations without operational disruption<\/li>\n<li>\u2022 Using packet capture tools to verify firewall behavior<\/li>\n<li>\u2022 Protocol compliance testing<\/li>\n<li>\u2022 Introduction to digital twins for modeling and simulation<\/li>\n<li>\u2022 Simulating common attack vectors to verify protection<\/li>\n<\/ul>\n<p><strong>Lab Exercise: Testing and validating the implemented ruleset<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Key takeaways: Methodologies for testing firewall configurations without operational disruption, using packet capture tools to verify firewall behavior, protocol compliance testing, introduction to digital twins for modeling and simulation and cimulating common attack vectors to verify protection.<\/p>\n","protected":false},"author":4,"featured_media":0,"template":"","meta":{"inline_featured_image":false,"footnotes":""},"session_track":[8],"session_location":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Testing and Validation - Industrial Security Conference Copenhagen<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/2-4-testing-and-validation\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Testing and Validation - Industrial Security Conference Copenhagen\" \/>\n<meta property=\"og:description\" content=\"Key takeaways: Methodologies for testing firewall configurations without operational disruption, using packet capture tools to verify firewall behavior, protocol compliance testing, introduction to digital twins for modeling and simulation and cimulating common attack vectors to verify protection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/2-4-testing-and-validation\/\" \/>\n<meta property=\"og:site_name\" content=\"Industrial Security Conference Copenhagen\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-20T08:22:19+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/sessions\/2-4-testing-and-validation\/\",\"url\":\"https:\/\/insightevents.dk\/isc-cph\/sessions\/2-4-testing-and-validation\/\",\"name\":\"Testing and Validation - Industrial Security Conference Copenhagen\",\"isPartOf\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#website\"},\"datePublished\":\"2025-06-11T13:04:00+00:00\",\"dateModified\":\"2025-06-20T08:22:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/sessions\/2-4-testing-and-validation\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/insightevents.dk\/isc-cph\/sessions\/2-4-testing-and-validation\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/sessions\/2-4-testing-and-validation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/insightevents.dk\/isc-cph\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Testing and Validation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#website\",\"url\":\"https:\/\/insightevents.dk\/isc-cph\/\",\"name\":\"Industrial Security Conference Copenhagen\",\"description\":\"Industrial Security Conference Copenhagen\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/insightevents.dk\/isc-cph\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Testing and Validation - Industrial Security Conference Copenhagen","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insightevents.dk\/isc-cph\/sessions\/2-4-testing-and-validation\/","og_locale":"en_GB","og_type":"article","og_title":"Testing and Validation - Industrial Security Conference Copenhagen","og_description":"Key takeaways: Methodologies for testing firewall configurations without operational disruption, using packet capture tools to verify firewall behavior, protocol compliance testing, introduction to digital twins for modeling and simulation and cimulating common attack vectors to verify protection.","og_url":"https:\/\/insightevents.dk\/isc-cph\/sessions\/2-4-testing-and-validation\/","og_site_name":"Industrial Security Conference Copenhagen","article_modified_time":"2025-06-20T08:22:19+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/insightevents.dk\/isc-cph\/sessions\/2-4-testing-and-validation\/","url":"https:\/\/insightevents.dk\/isc-cph\/sessions\/2-4-testing-and-validation\/","name":"Testing and Validation - Industrial Security Conference Copenhagen","isPartOf":{"@id":"https:\/\/insightevents.dk\/isc-cph\/#website"},"datePublished":"2025-06-11T13:04:00+00:00","dateModified":"2025-06-20T08:22:19+00:00","breadcrumb":{"@id":"https:\/\/insightevents.dk\/isc-cph\/sessions\/2-4-testing-and-validation\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insightevents.dk\/isc-cph\/sessions\/2-4-testing-and-validation\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/insightevents.dk\/isc-cph\/sessions\/2-4-testing-and-validation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/insightevents.dk\/isc-cph\/"},{"@type":"ListItem","position":2,"name":"Testing and Validation"}]},{"@type":"WebSite","@id":"https:\/\/insightevents.dk\/isc-cph\/#website","url":"https:\/\/insightevents.dk\/isc-cph\/","name":"Industrial Security Conference Copenhagen","description":"Industrial Security Conference Copenhagen","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insightevents.dk\/isc-cph\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/sessions\/3272"}],"collection":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/sessions"}],"about":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/types\/tec_session"}],"author":[{"embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/users\/4"}],"version-history":[{"count":0,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/sessions\/3272\/revisions"}],"wp:attachment":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/media?parent=3272"}],"wp:term":[{"taxonomy":"tec_track","embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/session_track?post=3272"},{"taxonomy":"tec_location","embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/session_location?post=3272"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}