Sunday, July 22, 2018

Classified ICS Security Information – An Example

Earlier this week I wrote a post on sharing of classified industrial control system (ICS) information sharing. As one of the ways to avoid the many complications of sharing classified information I mentioned preparing unclassified derivative works. This week the DHS US-CERT announced a series of web awareness briefings on one such derivative work; US-CERT Alert TA 18-074A, Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors.

The alert was issued in March of this year and includes a wealth of technical data including indications of compromise that could be used to search systems to see if similar attempts had been made to compromise those systems. But, being a technically oriented document, it does little to convince non-cybersecurity personnel about the existence and scope of the potential threat and who should be concerned about it. Hopefully, that is what these four web briefings (actually 1 briefing x 4) will address. The briefings will take place on:

• July 23rd, 2018, at 1:00 to 2:30 pm EDT;
• July 25th, 2018, at 1:00 to 2:30 pm EDT;
• July 30th, 2018, at 1:00 to 2:30 pm EDT; and
August 1st, 2018, at 1:00 to 2:30 pm EDT.

The webinar will be available via the Homeland Security Information Network (HSIN). An HSIN login is not required, but the Adobe Connect® application is being used so you need to allow time to download and install that before accessing one of the briefings. A dial-in audio link (1-888-221-6227) is also provided. Hopefully, this briefing will remain available after these dates for those of us who already have obligations at these dates and times.

No comments:

/* Use this with templates/template-twocol.html */