This account is pending registration confirmation. Please click on the link within the confirmation email previously sent you to complete registration. Need a new registration confirmation email? Click here
March 15, 2013 /PRNewswire/ -- Today Trend Micro Threat Researcher Kyle Wilhoit will present "Who's Really Attacking Your ICS Equipment?" at
Blackhat Europe 2013,
ICS/SCADA systems have been the talk of the security community for the last two years due to
Flame, and several other
threats and attacks. While the importance and lack of security around ICS systems is well documented and widely known, this talk illustrates Internet facing SCADA/ICS systems, who's really attacking them and why.
The presentation will include an overview on the honeynet/honeypot architecture developed by Kyle Whilhoit which directly mimics ICS/SCADA devices. In addition, this talk will cover techniques for securing ICS/SCADA systems and some best practices for doing so.
Kyle Wilhoit's research focuses on original threat, malware and vulnerability discovery/analysis. He has eight years of information security experience and holds several professional certifications. Prior to joining Trend Micro, he was the lead incident handler and reverse engineer at a large energy company, focusing on ICS/SCADA security and
persistent threats. He has also worked at a tier 1 Internet service provider as a threat analyst and incident response specialist.
The Report and blog post are available at:REPORT: http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-whos-really-attacking-your-ics-equipment.pdfBLOG POST: http://blog.trendmicro.com/trendlabs-security-intelligen/whos-really-attacking-your-ics-devicesAbout Trend Micro
Trend Micro Incorporated (
TSE: 4704), the
global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in
server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits our customers' and partners' needs, stops new threats faster, and protects data in
physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro™ Smart Protection Network™
global threat intelligence data mining framework, our products and services stop threats where they emerge – from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.
Additional information about Trend Micro Incorporated and the products and services are available at
Trend Micro.com. This Trend Micro news release and other announcements are available at
http://newsroom.trendmicro.com/ and as part of an RSS feed at
www.trendmicro.com/rss. Or follow our news on Twitter at @TrendMicro.
SOURCE Trend Micro Incorporated