Welcome! This meetup dedicated to all professionals involved in Cyber Security for Automated Processes and Control Systems including security for Operating Technology (OT), Industrial Control Systems (ICS), SCADA Systems, Transportation Systems, Building Control Systems (BCS), and even emerging Industrial Internet of Things (IIoT) systems. Our purpose is to connect the professionals in the Greater Tel Aviv area with real interest in or responsibility for the cyber security of these systems.
We gather for purposes of education, information exchange, and discovery of new opportunities and even a few happy hours! If you are interested in serving on a committee to help shape this meetup experience, please contact the organizers directly.
Registration required at: https://attendee.gotowebinar.com/register/2294256765326734350?source=101520MtpEvnts
From the JSOF research team who found Ripple 20 and broke the news that it was everywhere: Shlomi Oberman, Ariel Schön, and Moshe Kol.
This is the true story of finding and exploiting a series of critical vulnerabilities (later named Ripple20) affecting tens or hundreds of millions of IoT devices across all IoT sectors- industrial controllers, power grids, medical, home, networking, transportation, enterprise, retail, defense, and a myriad of other types of IoT devices, manufactured and deployed by the largest global vendors in these fields.
These vulnerabilities have lurked undetected for at least 10 or more years in a TCP/IP software library located at the very beginning of a complex supply chain. Over the past two decades this library has spread worldwide by direct use as well as indirectly, through "second hand" use, rebranding, collaborations, acquisitions and repackaging, being embedded and configured in a range of different ways. Many vendors indirectly selling and using this library were not aware of their using it. Even knowing, patch propagation dynamics are complex and may not be possible in some cases.
This library is a little known, but widely used, embedded one developed by Treck Inc. known for its high reliability, performance, and configurability. Its features make it suitable for real-time operating system usage and low-power devices.
Despite being used by many large, security-aware vendors, these vulnerabilities lay dormant and undiscovered - while actors of all types could have discovered these vulnerabilities by finding one of several bugs in any of the components, exposing hundreds of others immediately, providing a field day of affected devices for the picking.
We will discuss one of the vulnerabilities in technical depth, demonstrating an RCE exploit on a vulnerable device. We will explain how the vulnerabilities became so widespread, and what we still don’t know. We will speculate as to why these vulnerabilities survived for so long and show why some vendors are worse affected than others.
Register now to earn your Continuing Education Credits/Professional Development Units at https://attendee.gotowebinar.com/register/2294256765326734350?source=101520MtpEvnts