On 5th September 2013 Edgis' Sharing Session, Director of ThinkSECURE shared about "how attackers really view & target ICS/SCADA management backends".
This presentation and practical demonstration examines methodologies an attacker uses to engage specific target organisations running ICS/SCADA systems and looks at how modern ICS/SCADA management backends are no different from regular IT-based systems and thus present no new challenges to attackers.
About Julian Ho
A director at ThinkSECURE Pte Ltd (“ThinkSECURE”), Julian was previously responsible for security management of the public data network infrastructure at StarHub Ltd, and also for design, implementation and maintenance of security operations for AsiaPac’s largest hotspot deployments in 2002: StarHub’s Wireless Hotzones in Suntect International Convention & Exhibition Centre and Changi International Airport Terminal 1 & 2, totalling 100+ enterprise/carrier-class access points, routers, switches, SSGs and servers.
At ThinkSECURE, Julian has developed and released the award-winning OSWA-Assistant™ a specialised wireless auditing toolkit which assists IT professionals and organisations in testing and securing their WiFi, Bluetooth and RFID wireless deployments, which was showcased by the Wall-of-Sheep group at DEF CON 2008, 2009 and 2010.
A co-author of the 3rd Edition of the book “Hacking Exposed Linux”, published by McGraw-Hill, Julian was also the co-designer and GameMaster of the following IT-security tournaments:
BlackOPS:HackAttack IT-security tournaments held in Singapore in 2004;
AIRRAID, Asia’s first-ever true wireless hacking tournament, held in Singapore in 2005;
AIRRAID2, Thailand’s first-ever public security tournament in 2008;
ARRAID3 in conjunction with Singapore Polytechnic in 2010;
“Singapore Cyber Conquest – AIRRAID Edition” tournament at Ministry of Home Affairs’ Governmentware 2011 Conference;
DSTA Cyber Defenders Discovery Camp inaugural IT-security Tournament in 2012; and
AIRRAID4 in conjunction with Singapore Polytechnic in 2013.