Honeywell

REGISTER FOR WEBINAR

REGISTER FOR ON-DEMAND RECORDING



Attacking Management Applications
to Cross Trust Boundaries
Date: Tuesday, June 09, 2020
Time: 02:00 PM Central European Summer Time
Location: Location of the webinar
Duration: 1 Hour
On-demand webinar recording

Trust boundaries are demarcation lines which segment zones of differing trust, examples include the boundary between Enterprise & OT networks and the boundary between OT DMZ & critical control networks. As security increases, attackers targeting OT environments are becoming more creative and are turning to management applications (e.g. antivirus mgmt., backup mgmt., virtualization mgmt.) to breach these trust boundaries. This talk will explore how common management and security applications can be leveraged by an attacker to exploit associated systems which can ultimately act as a trust boundary bypass.

Speaker

Speaker image
Connor Leach
Advanced Project Engineer, Honeywell
Speaker Bio: Connor Leach is an OT Penetration Tester with Honeywell. He has over 10 years experience in the OT cybersecurity field and holds the following offensive certifications: Offensive Security Certified Expert (OSCE), Offensive Security Certified Professional (OSCP), GIAC Exploit Researcher and Advanced Penetration Tester (GXPN), and a GIAC Penetration Tester (GPEN). In his spare time, Connor also enjoys participating in capture the flag competitions and has been known to develop a janky tool or two.
Speaker image
Firstname
Title
Speaker Bio:Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.
Speaker image
Speaker Bio:
Speaker image
Speaker Bio:
Speaker image
Speaker Bio:
Speaker image
Speaker Bio:
Speaker image
Speaker Bio:
Speaker image
Speaker Bio: