CypherCon 2023: How to Safely Scan OT Devices in Critical Environments

Active scanning is often considered a no-go on industrial control systems and other OT and IoT devices because of bad experiences they’ve had. However, the reasons that led to devices freezing up are entirely avoidable. Alternatives, such as passive monitoring, are expensive and don’t yield great results.

In this talk, you’ll learn about the most common reasons why embedded devices become unstable and how to make active scanning perfectly safe. The talk is based on lab research. Its recommendations have been proven to work in manufacturing plants, hospitals, and utility companies.

Importance: Because passive discovery via SPAN or TAP is difficult and expensive to deploy and active scanning is considered a no-go, security teams responsible for OT environments lack good asset inventory. Without proper inventory and an understanding of the true network structure, security teams can’t be proactive about their security posture and leave their networks open to attacks. All of this is because of misconceptions about active scanning that can be easily resolved.

CypherCon is an annual Wisconsin hacker conference attracting over 1,500 attendees held in Milwaukee, Wisconsin each spring: https://cyphercon.com

Meet Our Speakers

Chris Kirsch

Contributor

Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Related Resources

Talks
Forging strong cyber communities in uncertain times
HD Moore and Nicole Schwartz explore what it takes to create and foster robust cybersecurity communities and why we should all get involved in...
Talks
Vulnerability haruspicy: picking out risk signals from scoring system entrails
Tod Beardsley explores the strengths and flaws of these systems, asking whether they improve risk decisions or simply rationalize them.
Talks
Rewriting the rules of exposure management
HD Moore examines why traditional vulnerability management tools continue to fail and why vendor hype and competing frameworks only add to the noise
Talks
There and back again: discovering OT devices across protocol gateways with Rob King
Rob King discusses the security implications of the convergence of IT and OT, with deep dives into OT protocols and device discovery.

See Results in Minutes

See & secure your total attack surface. Even the unknowns & unmanageable.