Tim Conway
FellowSANS ICS Curriculum Lead at SANS Institute
Specialities
Industrial Control Systems Security
Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsIndustrial Control Systems Security
Tim serves as the Technical Director of ICS and SCADA programs at SANS, and he is responsible for developing, reviewing, and implementing technical components of the SANS ICS and SCADA product offerings. A recognized leader in CIP operations, he formerly served as the Director of CIP Compliance and Operations Technology at Northern Indiana Public Service Company (NIPSCO), where he was responsible for Operations Technology, NERC CIP Compliance, and the NERC training environments for the operations departments within NIPSCO Electric.
Recognizing the need for ICS-focused cybersecurity training throughout critical infrastructure environments and increased demand for NERC CIP hands-on training, Tim authored and instructs the ICS curriculum’s ICS456: Essentials for NERC Critical Infrastructure Protection course, as well as the ICS612: ICS Cybersecurity In-Depth course. Outside of SANS, Tim continues to perform contract and consulting work in ICS cyber security, focusing on the energy sector.
Tim Conway is able to convey information to the class very clearly and adds extra content pertinent to the discussion.
ICS456 is the best-in-class NERC CIP Training. The courseware provides the students valuable compliance approaches and software tools to take home for peer collaboration to build consent on entities CIP implementation gaps.
ICS456 course prepares you for CIP, both technically and practically with a blend of experience and knowledge.
Here are upcoming opportunities to train with this expert instructor.
Explore content featuring this instructor’s insights and expertise.
As ransomware attacks continue to impact organizations around the world, and with recent events like the colonial pipeline impacts, we are seeing more and more attacks that have an adjacent or direct impact on Operational Technology environments. As ransomware attacks continue to rise, how should companies think about the cyber to physical impacts to their OT environments? Organizations responsible for operating and maintaining critical infrastructure environments need to consider the steps they should be pursuing right now before a potential attack occurs, establish and implement procedures on how or if they should operate their systems during an attack, and what actions need to be taken after an attack. Tim Conway & Jeff Shearer will discuss how organizations responsible for operating & maintaining critical infrastructure environments need to consider the following: Steps to pursue before a potential attack Procedures to implement during an attack Actions necessary to take after an attack
NERC CIP is complicated. Integrating solutions into your CIP program is complex. Demonstrating compliance in a zero-deficiency regulatory sector is challenging. Going beyond compliance in pursuit of expanded cybersecurity capabilities and innovative emerging solutions in ICS environments can be confusing. How do you determine the most appropriate operation technology solutions for your NERC CIP program? Are there unique operating models that make certain solutions better than others? In this webcast, SANS Instructor Tim Conway and Dragos Cyber Risk Advisor Jason Christopher look at the NERC CIP standards and explore how to balance technology implementations for resilient operations, cybersecurity, and compliance benefits. Attendees will learn how to integrate solutions into their CIP programs that help drive detection and incident response actions. Be among the first to receive the associated whitepaper written by Tim Conway.
SANS의 산업 제어시스템(ICS) 코스의 저자이며 국제적으로 유명한 Tim Conway와 Jeff Shearer이 핵심 인프라 및 프로세스 환경에서 근무하는 사이버보안 실무자들이 ICS 환경을 보호하고 위협 및 취약점 식별 방법을 익혀야 함에 있어 실무 경험과 전문 교육의 중요성에 대해 설명합니다. Jeff와 Tim은 ICS 환경을 지원하고 작업하는 모든 실무자님들이 접하게 될 공통 요소 및 자산 유형과 ICS 전문가들이 추구해야 하는 다양한 지식 영역에 대해 논의하고자 합니다.
Bergabunglah dengan para pakar global terkemuka dan instruktur pelatihan SANS ICS, Tim Conway dan Jeff Shearer, yang akan membahas perlunya pengalaman langsung dan pelatihan terfokus bagi praktisi keamanan siber yang bekerja di sektor infrastruktur vital dan lingkungan processing untuk mengidentifikasi ancaman dan kerentanan serta metode untuk mengamankan lingkungan ICS.
SANSのICSに関するコースを開発しているTim ConwayとJeff ShearerによるWebcastを開催します。TimとJeffは重要インフラやプロセス環境に携わるサイバーセキュリティ人材の実践的な経験や集中的なトレーニングの必要性について議論します。ICSの環境で働いていたり、サポートしたりしている方が関わる一般的な要素と資産の種類や、このコミュニティにいる専門家が知っておくべき様々な知識に関して説明します。
ความจำเป็นของประสบการณ์ที่ได้จากการลงมือปฏิบัติงานจริง และการฝึกอบรมแบบเจาะจงหัวข้อสำหรับผู้ที่ทำงานในสาย Cybersecurity ที่ต้องทำงานเกี่ยวกับ Critical Infrastructure การระบุภัยคุกคาม และข้อบกพร่องของระบบ กระบวนการทำให้ ICS ปลอดภัย Tim และ Jeff จะอภิปรายเกี่ยวกับ องค์ประกอบพื้นฐานของ ICS และชนิดของอุปกรณ์ที่จะพบกับใน ICS และระบบสนับสนุน
2月22日(火)に米国国土安全保障省は、あらゆる組織がロシアからのサイバーリスクにさらされていると警告しました。この警告は、ロシアによるウクライナの侵攻がエスカレートしていることを受けて発表されたもので、サイバー攻撃だけではなく地上での攻撃も含まれます
This urgent webcast will give an overview of current Russian Threat Actor capabilities, discuss critical infrastructure attacks on Ukraine, and possible escalation spillover into the EU and/or the United States.
SANS authors and instructors Robert M. Lee and Tim Conway have been working with the community to analyze all the known ICS cyber attacks for the purpose of creating the most important cybersecurity controls for organizations to implement.
This Webinar series will discuss the challenges presented by applying the NERC Critical Infrastructure Protection (CIP) standards to cloud computing environments. This first webinar in the series of six will dive into the topic from the various stakeholder perspectives and highlight the opportunities and challenges awaiting this sector.
The rapid adoption and growth of cloud computing solutions across industry sectors and application families is driven by the many advantages of cloud computing technologies. These include faster deployments, better scalability, improved vendor support and faster security patching, access to newer technology, better resilience, fault tolerance, and recovery options – all at a lower cost.
The third webinar in this six-part series will feature application providers discussing the pros and cons of offering cloud-based solutions to NERC entities. These providers will share their decision-making processes, focusing on how they navigate cloud deployment while acknowledging their customers' need for NERC CIP compliance.
In an era where cybersecurity threats are escalating, the oversight of Industrial Control Systems (ICS) is more critical than ever. Join us for an exclusive panel discussion with SANS instructors Robert M. Lee, Tim Conway, Dean Parsons, and Jason Christopher, as they address cybersecurity leaders on the imperative of securing ICS.
What can the underlying platform providers (CSPs) do to help transition services to cloud-based operations while maintaining CIP compliance? The various CSPs have been working with existing customer groups and industry to educate, collaborate, and contribute to a wide variety of activities involving NERC CIP and cloud.
The presentation will discuss and highlight the specific compliance issues and considerations to address when evaluating whether to use the cloud for various aspects of electric grid operations. During the presentation, the speaker will address specific NERC CIP Compliance, Rule of Procedure or Operation & Planning regulations that impact the asset owner's cloud infrastructure options.
In this sixth and final webinar in this series, we will hear from presenters on the topic of: Cloud Services and CIP Standards - The path forward. This will be a discussion with the presenters on what opportunities are happening now where the CIP community can work together to help entities understand technologies and requirements they are considering today as well as what activities are happening now to shape the requirements of the future.
Discover how the new ICS310: ICS Cybersecurity Foundations course is transforming the way professionals enter the critical field of ICS/OT cybersecurity. The world relies on critical infrastructure for all aspects of daily life, and sectors across the board have integrated Industrial Control Systems (ICS) and Operational Technology (OT) into their key operations. This evolution has created a pressing need for a uniquely skilled, diverse workforce equipped with expertise in engineering, operations, IT/OT, and cybersecurity.
In this talk, we will discuss the importance of the Industrial Control Systems and Operational Technology that is used to support the critical environments found throughout the world’s critical infrastructure. Whether you are new to the ICS/OT community, working in it for a long career, or you are just looking to understand the “OTher side of business”, join us and get involved in the conversation. The talk will highlight some of the key drivers and constraints across IT and OT, introduce key concepts, workforce needs, and have an open discussion on some common questions in the ICS community, including:• Attacker Objectives in ICS Environments• IT / OT – it’s all just “T” right?• Insecure by Design vs Secure by Design vs Cyber Informed Engineering• Engineers or Cyber pros, Degrees or Certs, and Career Lifecycle• Regulations and 5 Critical Controls for ICS
OT ransomware is a growing threat to any organization that relies on ICS/OT to power its operations. Whether securing critical infrastructure or ensuring the continuity of manufacturing, pharmaceuticals, food and beverage production, or other industrial processes, protecting these environments is essential.
As cyber threats become increasingly advanced and persistent, traditional perimeter-based defenses are no longer sufficient to protect critical infrastructure.
Review relevant educational resources made with contribution from this instructor.