{"id":51981,"date":"2017-12-11T10:00:10","date_gmt":"2017-12-11T18:00:10","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=51981"},"modified":"2017-12-10T09:53:18","modified_gmt":"2017-12-10T17:53:18","slug":"secure-ot-introducing-new-ics-cybersecurity-hands-workshop","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2017\/12\/secure-ot-introducing-new-ics-cybersecurity-hands-workshop\/","title":{"rendered":"Secure Your OT: Introducing Our New ICS Cybersecurity Hands-on Workshop"},"content":{"rendered":"<p>In June at Ignite \u201817 Security Conference, we hosted for the first time a new ICS-specific technical workshop called the Industrial Cybersecurity Hands-on Workshop or \"ICS HoW\" for short. This was provided as a free, guided class which taught students how to use our platform to secure their industrial automation environment through a series of hands-on exercises in a fully virtualized ICS environment. The feedback we received was very positive as it gave both IT and OT cybersecurity practitioners a chance to really understand (through implementation) the capabilities of the platform in different ICS-specific use case lab exercises.<\/p>\n<p>Today we are happy to announce the immediate availability of the ICS HoW as a customer workshop event which can be run as a Palo Alto Networks-hosted event or even at a customer site. We see the awareness and interest for ICS cybersecurity continue to increase so we are pleased to help the industry address this pent-up demand for knowledge.<\/p>\n<p>The current ICS HoW release is focused on how to achieve better ICS-specific visibility, access control and threat prevention via App-ID, User-ID and Content-ID. Future updates are planned to include other use cases and capabilities of our next-generation security platform. In addition to great learning, students also have an opportunity to network with their IT\/OT colleagues, industry peers and other ICS cybersecurity experts to learn about different security use cases and best practices.<\/p>\n<p>You can learn more about ICS HoW and request more information on how to participate in one of our events by going to the <a href=\"https:\/\/www.paloaltonetworks.com\/solutions\/industries\/enterprise\/scada-and-industrial-control\/ics-cybersecurity-how.html\">ICS HoW<\/a> page or by contacting your Palo Alto Networks sales representative.<\/p>\n<p>Learn more about our solution for ICS\/SCADA by reading our <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/whitepapers\/industrial-control-blueprint-reference\">reference blueprint white paper<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Secure your OT: introducing our New ICS cybersecurity hands-on workshop.<\/p>\n","protected":false},"author":46,"featured_media":21531,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[566],"tags":[5007,411],"coauthors":[693],"class_list":["post-51981","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-scada-ics","tag-hands-on-workshop","tag-ics"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/11\/blog-generic-banner-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/51981","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=51981"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/51981\/revisions"}],"predecessor-version":[{"id":52623,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/51981\/revisions\/52623"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/21531"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=51981"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=51981"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=51981"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=51981"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}