Podcast: Penetration testing with Ed Skoudis

Cyber security consultant and trainer, Ed Skoudis, explains how thinking like a hacker can be the key to finding vulnerabilities in your control networks.


If you are trying to evaluate your cyber defenses, one sure test is to see if you can find a weak point and make it break. Such is the objective with penetration testing, where system evaluators use the same techniques as a hacker to probe for vulnerabilities and exploit them. When the hacker is working for you, there's time to fix things before someone more malicious finds the same weakness.

Ed Skoudis is a co-founder of Inguardians and an instructor in penetration testing for the SANS Institute . In the podcast, he explains how penetration testing differs from more general vulnerability assessments, and how hackers can exploit low-level vulnerabilities by using them in combination. When a team of specialists starts to pull apart a system, each using his or her specific area skills, flaws can be identified before it's too late.

Listen to the podcast now , and look for other cyber security podcasts and videos at CEtv . Also read our cyber security blog with Matt Luallen and Steve Hamburg .

No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
This eGuide illustrates solutions, applications and benefits of machine vision systems.
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Make Big Data and Industrial Internet of Things work for you, 2017 Engineers' Choice Finalists, Avoid control design pitfalls, Managing IIoT processes
Engineering Leaders Under 40; System integration improving packaging operation; Process sensing; PID velocity; Cybersecurity and functional safety
Mobile HMI; PID tuning tips; Mechatronics; Intelligent project management; Cybersecurity in Russia; Engineering education; Road to IANA
This article collection contains several articles on the Industrial Internet of Things (IIoT) and how it is transforming manufacturing.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

SCADA at the junction, Managing risk through maintenance, Moving at the speed of data
Flexible offshore fire protection; Big Data's impact on operations; Bridging the skills gap; Identifying security risks
The digital oilfield: Utilizing Big Data can yield big savings; Virtualization a real solution; Tracking SIS performance
click me