John Mulder | Principle Member of Technical Staff | Sandia National Labs

John Mulder is a Principal Member of Technical Staff at Sandia National Laboratories. His research has focused on industrial control system security and embedded systems development.


John has extensive experience conducting control systems security assessments, ranging from on-site red team engagements to critical infrastructure testing, and leading development to mitigate vulnerabilities in control systems.

chris sandia labs.png

Chris Abate | Principle Member of Technical Staff | Sandia National Labs

Chris Abate is a Principal Member of Technical Staff at Sandia National Laboratories. While at Sandia his work has focused on cyber security in the industrial control system realm including: testing, modeling, OT device assessments, and ICS system assessments.


Prior to Sandia, Chris worked as a software developer on various ICS related SCADA software, including Energy Management Systems (EMS), Distribution Management Systems (DMS), and Distributed Energy prototype software.


How Sandia leverages testbeds, sensors, and analytics for OT R&D

Industrial control systems (ICS) and their associated SCADA technologies are the essential but vulnerable backbone to critical infrastructure operations. The need to advance our state-of-the-art technologies is vividly shown by attacks on ICS such as Colonial Pipeline, Stuxnet, CrashOverride, and Pipedream. World events have shown that our way of life hangs on our ability to protect, detect, react, and recover from infrastructure cyber-attacks.

Research and development of state-of-the-art technologies must be built and tested in laboratories and testbeds because we cannot simply “turn it off and turn it on again” if we make a mistake in testing an electric grid or nuclear submarine.

This session will talk about ICS testbed capabilities developed at Sandia National Laboratories. We will answer the following questions:

  • Why and how do we use ICS testbeds and analytics for ICS?

  • What are the use cases?

  • What capabilities do we use to conduct cyber analysis and meet specific use cases?

  • What are the open research questions that we intend to prioritize in the next 10 years?  How will these keep us ahead of the adversary?