Skip survey header

ISSA Web Conference Mar 2 2015: What You didn't know Computers Control you ICS and SCADA

Thank you for attending the ISSA Web Conference - "What? You didn't know Computers Control you? / ICS and SCADA" on March 2, 2015. Please complete the following quiz based on information presented during the conference. After successful completion of the quiz, a message will appear indicating you have passed (or neglected to pass). A passing message or "Certificate of Attendance" can be printed and used as verification of your participation. Please PRINT this page and use it to submit CPE (continuing professional education) credit in accordance with the guidelines of the certifying organization.
This question requires a valid email address.
3. How satisfied are you with the educational content of the ISSA Web Conferences?
Very SatisfiedSatisfiedNeutralDissatisfiedVery DissatisfiedNot Applicable
4. Which of the following educational subjects are the most valuable to you?
Space Cell Very ValuableValuableSomewhat ValuableNot Valuable
Application Security
Data Protection
Disaster Preparedness
Endpoint Security
Governance, Risk & Compliance
Identity Management
Incident Response
Information Security Ethics
Legal/Regulatory Trends
Physical Protection of IT Assets
Research & Trends
Securing the Mobile Workforce
Security and Third Party Vendors (Cloud, SaaS, etc)
Security Awareness
Strategy & Architecture
Threat Updates
6. According to Del Rodillas, Securing the perimeter between IT and the control systems environment is sufficient for securing the control systems. *This question is required.
7. According to Del Rodillas, Firewalls with visibility and access control at the port level is adequate for securing the SCADA environment. *This question is required.
8. According to Del Rodillas, It is common practice for SCADA and ICS systems software and anti-virus/IPS signature databases unpatched for months, sometimes years. *This question is required.
9. According to Mario Chiock, What are the ingredients for a successful SCADA attack? *This question is required.