Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
October 23, 2020SCADA and ICS Devices52 minutesPlayA conversation with Jim Gilsinn, Here he talks about • Communication models of ICS• Responding to attacks on SCADA• Talks about Stuxnet & why it is harmless on non-PLC devices • A quick walk-through on vulnerability assessment of SCADA• How OSINT plays a role on hunting vulnerable devices...moreShareView all episodesBy Ic0deOctober 23, 2020SCADA and ICS Devices52 minutesPlayA conversation with Jim Gilsinn, Here he talks about • Communication models of ICS• Responding to attacks on SCADA• Talks about Stuxnet & why it is harmless on non-PLC devices • A quick walk-through on vulnerability assessment of SCADA• How OSINT plays a role on hunting vulnerable devices...more
A conversation with Jim Gilsinn, Here he talks about • Communication models of ICS• Responding to attacks on SCADA• Talks about Stuxnet & why it is harmless on non-PLC devices • A quick walk-through on vulnerability assessment of SCADA• How OSINT plays a role on hunting vulnerable devices
October 23, 2020SCADA and ICS Devices52 minutesPlayA conversation with Jim Gilsinn, Here he talks about • Communication models of ICS• Responding to attacks on SCADA• Talks about Stuxnet & why it is harmless on non-PLC devices • A quick walk-through on vulnerability assessment of SCADA• How OSINT plays a role on hunting vulnerable devices...more
A conversation with Jim Gilsinn, Here he talks about • Communication models of ICS• Responding to attacks on SCADA• Talks about Stuxnet & why it is harmless on non-PLC devices • A quick walk-through on vulnerability assessment of SCADA• How OSINT plays a role on hunting vulnerable devices