Trust boundaries are demarcation lines which segment zones of differing trust, examples include the boundary between Enterprise & OT networks and the boundary between OT DMZ & critical control networks. As security increases, attackers targeting OT environments are becoming more creative and are turning to management applications (e.g. antivirus mgmt., backup mgmt., virtualization mgmt.) to breach these trust boundaries. This talk will explore how common management and security applications can be leveraged by an attacker to exploit associated systems which can ultimately act as a trust boundary bypass.
![]() |
Connor Leach
Advanced Project Engineer Honeywell
Speaker Bio: Connor Leach is an OT Penetration Tester with Honeywell. He has over 10 years experience in the OT cybersecurity field and holds the following offensive certifications: Offensive Security Certified Expert (OSCE), Offensive Security Certified Professional (OSCP), GIAC Exploit Researcher and Advanced Penetration Tester (GXPN), and a GIAC Penetration Tester (GPEN). In his spare time, Connor also enjoys participating in capture the flag competitions and has been known to develop a janky tool or two.
|
![]() |
Firstname
Title
Speaker Bio:Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.
|
|
Speaker Bio:
|
|
Speaker Bio:
|
|
Speaker Bio:
|
|
Speaker Bio:
|
|
Speaker Bio:
|
|
Speaker Bio:
|