CUPERTINO, Calif., March 15, 2013 /PRNewswire/ -- Today Trend Micro Threat Researcher Kyle Wilhoit will present "Who's Really Attacking Your ICS Equipment?" at Blackhat Europe 2013, Amsterdam, Netherlands.
ICS/SCADA systems have been the talk of the security community for the last two years due to Stuxnet, Flame, and several other threats and attacks. While the importance and lack of security around ICS systems is well documented and widely known, this talk illustrates Internet facing SCADA/ICS systems, who's really attacking them and why.
The presentation will include an overview on the honeynet/honeypot architecture developed by Kyle Whilhoit which directly mimics ICS/SCADA devices. In addition, this talk will cover techniques for securing ICS/SCADA systems and some best practices for doing so.
Kyle Wilhoit's research focuses on original threat, malware and vulnerability discovery/analysis. He has eight years of information security experience and holds several professional certifications. Prior to joining Trend Micro, he was the lead incident handler and reverse engineer at a large energy company, focusing on ICS/SCADA security and persistent threats. He has also worked at a tier 1 Internet service provider as a threat analyst and incident response specialist.The Report and blog post are available at: REPORT: http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-whos-really-attacking-your-ics-equipment.pdf
BLOG POST: http://blog.trendmicro.com/trendlabs-security-intelligen/whos-really-attacking-your-ics-devices
About Trend Micro Trend Micro Incorporated ( TYO: 4704; TSE: 4704), the global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits our customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro™ Smart Protection Network™ global threat intelligence data mining framework, our products and services stop threats where they emerge – from the Internet. They are supported by 1,000+ threat intelligence experts around the globe. Additional information about Trend Micro Incorporated and the products and services are available at Trend Micro.com. This Trend Micro news release and other announcements are available at http://newsroom.trendmicro.com/ and as part of an RSS feed at www.trendmicro.com/rss. Or follow our news on Twitter at @TrendMicro. SOURCE Trend Micro Incorporated