Leveraging Network Visibility to Validate Defensible Architecture
About This Session
The SANS ICS Five Critical controls provide an overview of the core principals of cybersecurity in critical infrastructure. Control 3, ICS network visibility, provides the positive feedback to validate the implementation of the other critical controls. Using network visibility to see the outcome of several tests, organizations can see and validate the defensible architecture solutions in place. Attempting to jump network zones, bypass firewalls, or break through levels of trust highlights whether network defenders can see such attempts and that the current segmentation tools are effective implemented. Furthermore this process can be automated.
Speaker
Mackenize Morris
Principal Industrial Consultant at Dragos - Dragos
Mackenize Morris is a Principal Industrial Consultant at the industrial cybersecurity company Dragos, Inc. where he assists the professional services teams in conducting network and vulnerability assessments. Dragos works to secure critical infrastructure organizations including power, water, and manufacturing.
Prior to joining Dragos, Mackenize worked as a process controls engineer and system architect of DCS systems until fully switching over to an ICS cybersecurity position within the DOE complex.
Mackenize received his B.S. in Chemical Engineering and MBA from the University of South Carolina as well as a Masters in Information Security Engineering from the SANS Technology Institute. He currently holds over a dozen cybersecurity certifications.
Prior to joining Dragos, Mackenize worked as a process controls engineer and system architect of DCS systems until fully switching over to an ICS cybersecurity position within the DOE complex.
Mackenize received his B.S. in Chemical Engineering and MBA from the University of South Carolina as well as a Masters in Information Security Engineering from the SANS Technology Institute. He currently holds over a dozen cybersecurity certifications.
