On Tuesday eight ICS vendors will participate in the ICS Detection Challenge. They will be given ICS packet captures from a diverse set of actual ICS and be scored first on their ability to create an asset inventory. The second part of the Challenge is to identify cyber attacks and cyber incidents, inserted by the Challenge team, from the packet captures.
In this session the results from the Challenge will be announced and analyzed. In addition to Ron and Dale’s analysis, the top four performing teams will be brought on stage and questioned on specific areas of the competition. We will also show video examples of selected teams describing their detection process using the tools. Come see what this product category is capable of and what vendors are in the Top Tier.