Skip to main content
December 6 Workshop: Find Out What to Do When Building Control Systems Get Hacked

Next week's workshop, sponsored by the National Institute of Building Sciences, will answer the question of what to do when building control systems have been hacked or taken over by ransomware. Intended for building owners, facility managers, engineering, physical security, information assurance and other professionals involved with the design, deployment and operation of building control systems, the “Your Building Control Systems Have Been Hacked, Now What? Workshop,” to be held Tuesday, December 6, from 8:00 am to 5:00 pm, in Gaithersburg, Maryland, will provide a combination of classroom learning modules and hands-on laboratory exercises to help attendees learn how to detect, contain, eradicate and recover from a cyber event.

The workshop, taught by Michael Chipley, PhD, GICSP, PMP, LEED AP; Daryl Haegley, OCP, CCO; and Eric Nickel RCDD, CEH, CEP, is built around the Advanced Control System Tactics, Techniques and Procedures (TTPs) developed by the U.S. Cyber Command (USCYBERCOM), which provide detailed step-by-step guidance to respond to a cyber attack.

During the one-day workshop, attendees will use the Cyber Security Evaluation Tool (CSET), GrassMarlin, Glasswire and Belarc tools to create a fully mission-capable (FMC) baseline, which consists of documentation that characterizes the control system, such as the topology diagram, enclave entry points, user accounts, server/workstation documentation and network documentation.

Next, attendees will conduct footprinting and learn how to find building control systems exposed on the internet using Google Hacking, Shodan and WhiteScope discovery tools. Attendees will then build a Recovery Jump-Kit that contains the tools the control systems team and information technology (IT) team will need to restore a system to its last FMC state during mitigation and recovery. Using the Recovery Jump-Kit, attendees will then find and eradicate the malware using tools such as MalwareBytes and the Microsoft Internals suite, and learn how to perform data collection for forensics, which involves the acquisition of volatile and non-volatile data from a host, a network device and control system field controllers. Lastly, attendees will evaluate the cyber severity of the incident and prepare an incident report.

Attendees will need a laptop with administrative privileges to load software. Course content, tools and lab exercises will be provided on a CD at the beginning of the workshop.

About NIBS

National Institute of Building Sciences brings together labor and consumer interests, government representatives, regulatory agencies, and members of the building industry to identify and resolve problems and potential problems around the construction of housing and commercial buildings. NIBS is a nonprofit, non-governmental organization. It was established by Congress in 1974. For more information, visit nibs.org or follow @bldgsciences on Twitter and Facebook.

Media Contact
Christine Cube
Social Media & Public Relations Manager
(202) 289-7800
ccube@nibs.org
Topics
Cybersecurity