IT Security for Building Control Systems Webinar

Map Unavailable

Date(s) - 11/16/2016
12:00 AM

There are no categories to show at this time.


What damage could a malicious party with access to your building control system do to your business? Our facilities operations are increasingly reliant on complex IT systems for system operation through monitoring and controls and also business intelligence through data collection and analytics. What were once isolated control systems are becoming Internet-connected (IoT) IT networks interfacing with multiple internal business systems and external cloud services. As our building systems become more powerful and interconnected, they also become more tempting and profitable targets. Using publicly available search tools it is easy to discover literally thousands of unsecured BMS web login forms, BacNet and Modbus Gateways, SCADA devices and more.
Is one of these systems in your building? An increase in the adoption of IoT devices and cloud service integration will present an exponential increase of network exposure to reachable and exploitable vulnerabilities (network attack surface) and overall damage potential. How are you going to protect your facility and your business?
This presentation will:
  • Show real-world examples of vulnerable systems.
  • Provide a high level introduction to some of the terminology of IT security critical to this topic, specifically Secure Hypertext Transfer Protocol (HTTPS) Secure Sockets Layer/Transport Layer Security (SSL/TLS) and Virtual Private Networking (VPN).
  • Describe the necessity of using SSL/TLS on all web pages to minimize the risk of password interception and data modification.
  • Convey the importance of moving control devices (BacNet, Modbus, etc) behind a firewall and tunneling the necessary site-to-site traffic over Virtual Private Networks (VPN).
  • Identify best practices for achieving a basic level of security and point to resources to aid in implementation.

    Understand the urgent necessity of IT security in control system networks.

    Become familiar with basic IT security technologies used to secure Internet communication.