Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 17 May, 2022
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Cyber Security Challenge finalists face ICS test

by The Gurus
March 12, 2015
in Editor's News
Share on FacebookShare on Twitter

As well as facing the Flag Day Associates in the main Cyber Security Challenge, candidates are also facing a live smart grid security issue.
In the separate challenge, candidates get 70 minutes to defend and provide a security validation test of an industrial control system. With each of the seven teams getting the opportunity to do this, they will also be asked to debrief the organisers from Airbus on their work and actions.
_ML21588
Specifically, the teams will: undertake intelligence gathering about the operation and architecture of the system; provide a vulnerability assessment of the environment; assess the exploitability and impact of the vulnerabilities within the environment; and provide a briefing about the validity of the security architectures in place and make recommendations about improvements to the architectures prior to real world deployment.
In particular, the teams will defend a testing environment which contains industrial control systems configured for electricity smart grid, water treatment and purification and a chemical waste handling facility.
Joe Stirland, cyber security research engineer at Airbus who organised and are managing the challenge, told IT Security Guru that there is a real skills shortage in industrial control system and SCADA security and with the live demo, it will give candidates the opportunity to be responsible for a real system.
“This is a new experience of securing an architecture and identifying who is going to find the vulnerabilities and be sympathetic to them, as some vulnerabilities can fail and the candidates will have to find a way to protect them from the cyber criminals,” he said.
“The candidates are doing penetration testing and identifying vulnerabilities for fun, and the idea is to go through and identify processes based on how they work. Afterwards they give us details of the vulnerabilities.”
Stirland admitted that the test will take the candidates out of their comfort zone as they will not have dealt with something like this. “The winning team will do an assessment of the environment and we are looking for penetration testing that will not compromise the industrial control system,” he said.
Cyber Security Challenge CEO Stephanie Damon said that the timing is pertient for critical national infrastructure considering how many systems are now being brought online.
Speaking to IT Security Guru, Cyber Security Challenge director Nigel Harrison said that this will enable a new area and new skills. “As industrial control systems and signalling all have potential vulnerabilities, it is good for the candidates to down tools and look at the attack potential of this,” he said.

FacebookTweetLinkedIn
Tags: ICSPenetration TestingSCADAVulnerability
ShareTweetShare
Previous Post

Cyber Security Challenge candidates battle in masterclass final

Next Post

Cyber Security Challenge 2015

Recent News

Armis: Top Performer in Asset Visibility and Real-Time Detection in MITRE Engenuity ATT&CK® Evaluations for Industrial Control Systems (ICS)

Armis Launches new ‘Critical Infrastructure Protection Program’

May 17, 2022
jigsaw

Thanos and Jigsaw ransomware linked to 55 year old doctor

May 17, 2022
Google logo

Italian police thwart Eurovision cyberattack

May 17, 2022
nuclear power stack

UK announces nuclear cybersecurity strategy

May 16, 2022

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information