This episode examines how a user checking personal email on an application host in a commercial building could compromise the building’s HVAC, central plant equipment and controllers. It discusses how downstream devices are at risk and how attackers with knowledge of building control systems may exploit interoperability. The talk walks through the events in order and the remediation steps, and what actions may have inflamed attackers rather than stopped them.
talk-data.com
F
Speaker
Fred Gordy
1
talks
Director of Operational Technology Risk Assessment
Michael Baker International
He's a passionate Building/OT Cybersecurity Practitioner, Speaker, and Author in this field, who has been working in the protection of Smart Buildings and Facilities since before those terms existed.
Bio from: (CS)²AI Online™ Replay: Anatomy of an Attack - From Encryption to Destruction
Frequent Collaborators
Filtering by:
(CS)²AI Online™ Replay: Anatomy of an Attack - From Encryption to Destruction
×
Filter by Event / Source
Talks & appearances
Showing 1 of 2 activities