Difference between revisions of "April 2011"

From mn/ifi/AFSecurity
Jump to: navigation, search
(Created page with "==AF''Security'' Seminar: ''The Stuxnet Worm''== Date: Friday 8 April 2011. Location: Meeting room Awk (3118), Ole-Johan Dahls hus (IfI-2). '''Agenda''' 13:00h Welcome at IfI...")
 
 
Line 14: Line 14:
  
 
'''ABSTRACT:''' The Stuxnet worm came as a suprise to security experts because of its complexity and because it targeted very specific industrial process control systems. When in addition the Stuxnet code used multiple zero-day exploits and was signed by valid software certificates it was quickly described as the most advanced malware attack ever. This talk presents the story of Stuxnet, and looks into the crystal ball to see what type of similar attacks we can expect in the future.
 
'''ABSTRACT:''' The Stuxnet worm came as a suprise to security experts because of its complexity and because it targeted very specific industrial process control systems. When in addition the Stuxnet code used multiple zero-day exploits and was signed by valid software certificates it was quickly described as the most advanced malware attack ever. This talk presents the story of Stuxnet, and looks into the crystal ball to see what type of similar attacks we can expect in the future.
 +
 +
Presentation slides: [[Media:AFSec20110408-Mork-Norman.pdf]]
  
 
'''SPEAKER:''' Geir Mork, Principal Software Strategist, Norman Data Defense.
 
'''SPEAKER:''' Geir Mork, Principal Software Strategist, Norman Data Defense.

Latest revision as of 06:10, 15 April 2011

AFSecurity Seminar: The Stuxnet Worm

Date: Friday 8 April 2011.

Location: Meeting room Awk (3118), Ole-Johan Dahls hus (IfI-2).

Agenda

13:00h Welcome at IfI

13:15h Invited talk

TITLE: The Stuxnet Worm; Retrospective and Future Scenarios

ABSTRACT: The Stuxnet worm came as a suprise to security experts because of its complexity and because it targeted very specific industrial process control systems. When in addition the Stuxnet code used multiple zero-day exploits and was signed by valid software certificates it was quickly described as the most advanced malware attack ever. This talk presents the story of Stuxnet, and looks into the crystal ball to see what type of similar attacks we can expect in the future.

Presentation slides: Media:AFSec20110408-Mork-Norman.pdf

SPEAKER: Geir Mork, Principal Software Strategist, Norman Data Defense.

BIO: Geir Mork has 20 years of experience with network and information security. For the last 7 years he has worked on developing sophisticated network security products in Norman Data Defense's R&D Unit. Geir has also worked on risk analysis and contingency planning as a technical consultant.

14:00h Discussion

14:30h End