Industrial mitap # 3: focus is on safe automation of technological processes



    On June 1, in the Moscow office of Kaspersky Lab, within the framework of the CoLaboratory platform, the third meeting will be held on industrial safety, namely, the protection of process control systems. We will discuss the features and technologies of information security processes in production, starting from general tips for finding holes in the system and ending with machine learning methods for detecting anomalies. Special attention will be paid to a special project that identifies vulnerabilities for you. Three guests are waiting for our guests.

    • The Tale of How Nuba ASU TP breaks, or Practical Tips "How not to become an easy target . " Stepan Nosov, an independent expert, talks about typical misconceptions and errors in configuring security systems at industrial sites in Russia. Such oversights can lead to a complete compromise of the CVO even by low-skilled intruders. We will “prescribe” you a couple of quick recipes for “headaches”, seasoning them with options for dealing with cases like The Shadow Brokers plum.
    • Machine Learning for Anomaly Detection . The data of operational technologies today is too diverse, and therefore, machine learning methods are often used to detect anomalies in the manufacturing process. One of them will be described in detail by Andrey Lavrentyev, head of the technology development department of the LC.
    • Free SCADA. What is it and why does it exist? Free SCADA is an educational open-source project whose main goal is to demonstrate typical vulnerabilities in ICS components. Boris Savkov from ASP Labs will not only tell you what the project is and why it is needed, but also show it in action.

    The meeting will be held at our headquarters on June 1 from 19:00 to 21:30 - details and registration are available here . If you can’t come, join our YouTube broadcast on the LC channel , where you can also find later records of our meeting. We are waiting for you!

    Also popular now: