<iframe src="//www.googletagmanager.com/ns.html?id=GTM-MZTJSD" height="0" width="0" style="display:none;visibility:hidden">

Download the white paper: "Defending Against the Dragonfly Cyber Security Attacks

Belden’s white paper series “Defending Against the Dragonfly Cyber Security Attacks,” written by ICS security expert Joel Langill, has four parts.

Each part is being released separately in order to make the information available to the public as quickly as possible.

Once you download any part of this series:

  • You will receive email notification when the other parts are available.
  • Each part released will be appended to earlier sections.
  • With the release of Part D, the complete white paper series will be available as one integrated report.

Here is the status of the white paper series “Defending Against the Dragonfly Cyber Security Attacks.”

Part

Date Released

Description

Suitable for People in These Roles

Part A – Identifying the Targets

 Sept. 15,
2014

Describes the overall Attack campaign with a focus on determining who the targets were.

  • Executives
  • Controls Engineers
  • Electrical Engineers
  • Network Engineers
  • IT Professionals
  • Electrical Engineers
  • Security Professionals

Part B – Analyzing the Malware

Oct. 22, 2014

Details the key Building Blocks used in the attacks. Includes Part A.

  • IT Professionals
  • Security Professionals

Part C – Assessing the Consequences

Dec.10, 2014

Discusses the Consequences of the attacks to industry and analyzes the impact to a victim’s ICS infrastructure.

  • Executives
  • Controls Engineers
  • Electrical Engineers
  • Network Engineers
  • IT Professionals
  • Security Professionals

Part D – Defending Industrial Control Systems

Dec 10,2014

Defines the most effective Defenses that could be deployed to minimize the risk to operations from not only Dragonfly, but similar targeted attacks. This approach is meant to aid in improving the cyber resilience of ICS installations to future attacks.

  • Executives
  • Controls Engineers
  • Electrical Engineers
  • Network Engineers
  • IT Professionals
  • Security Professionals