Session #13: Defending Utilities in the Age of Advanced Persistent Threats
Presented by Keystrike
2:15 PM - 3:00 PMThu
South Flex B/C
Breakout Session
Registration Required

Your registration must include one of the required registration options to attend this session. [ Details ]

Speakers
Andrew Fife
Co-Founder
Keystrike
CISF2025 Partners
Keystrike
As pioneers in the field of cybersecurity, we are unafraid to break the mold and challenge conventions while fostering research and collaboration. We make decisive choices and anticipate changes to shape a future-ready approach.
Utilities and critical infrastructure have becoming the favorite target of state-sponsored attackers who seek to disrupt the OT environment and cyber attacks against utilities have risen 70% in 2024. These attackers typically use social engineering to compromise workstations and then move laterally into the OT environment by taking over the user’s authorized accounts. This is the advanced persistent threat’s (APT) bread and butter because identity security controls store tokens, cookies, tickets, etc. on the user’s workstation. When the workstation is compromised, attackers can simply usurp these access tokens for their own purposes without raising any suspicion. Even MFA and PAM solutions are ineffective against this common attack path because they also store access tokens on the workstation. After the user provides the 2nd factor for MFA or PAM, the attacker can take over the authenticated session. Expected Outcome: - A timeline of recent cyber attacks on utilities - Security baseline assumptions - Attacker motivations - How attackers move inside IT and OT networks - Best practices to block these types of attacks - Keystrike testimonial from Global Water Resources Intended Audience: IT, Security, and Identity and Access Management professionals from critical infrastructure organizations.