Explaining ICS to a fool of a Took
2024-12-14 , Track 3

There are thirteen pillars upholding the critical national infrastructure (CNI) that allows for the every day running of our society. These pillars are sectors that rely on four generations of operational technology (OT) systems with the oldest generation being pre-Internet. What are these industrial control systems (ICS) that we rely on, and how are they vulnerable? This talk will outline a generic ICS from the hardware to the protocols that allow the complex systems to speak with one another. Research into these systems is often done on physical testbeds and digital twins (I don't know about you, but I wouldn't want to try hack an actual nuclear reactor). The talk will discuss the testbeds that I'm lucky enough to play with day-to-day. How are these industrial control systems vulnerable, and what can we do to protect these systems from malicious actors? Finally, how are these thirteen pillars connected? If we knock one down, will the others fall like dominos?


What will be covered:

Intro to CNI & OT security
Industrial control systems
Control loops & ladder logic
Testbeds including digital twins
OT Protocols such as Modbus
Known technical vulnerabilities
Security concepts and solutions
Interconnectivity of CNI sectors

I'm a software engineering teacher and industrial cybersecurity researcher at a university in the Welsh capital. Navigating the usual shenanigans of being a doctoral candidate, while juggling the stress of being an academic staff member. I spend more time outdoors than indoors these days, ideally with a book in my hands, and I'm looking forward to getting my floppy hat!