s4x17 2017 Jan. 10, 2017 to Jan. 13, 2017, miami,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Come Together! Dale Peterson Dale Peterson kicks off S4x17 with a mini-keynote to introduce the theme of the event: ...
Keynote: Protecting National Assets Against Nation State Threats Mary Mccord Mary B. McCord is the Acting Assistant Attorney General and Principal Deputy Assistant Attorney General ...
News From Ukraine Marina Krotofil A quick, 15-minute preview of a longer talk in the afternoon. This session will provide ...
Sitting Under the Industrial Sword of Damocles: Four Predictions Everyone Must Consider Michael J. Assante The new age of automation will present immense wealth, luxury and power to its masters ...
Uncomfortable Truths Require Uncomfortable Response Joshua Corman CyberPolicy is upon us. Ready or not, like it or not, the public policy world ...
MUD - To Help Secure IoT Marc Blackmer This session will describe the basics and purpose of the Manufacturer Usage Description (MUD) protocol, ...
Panel: Will ICS Certification Make A Difference ... And When? Dale Peterson , Paul Forney , Kenneth Modeste We have a growing number of ICS cybersecurity certification efforts, but arguably none have become ...
Cyber Nationalism: How Nations’ Offensive and Defensive Ops Affect All of Us Ben Buchanan ICS Vendors and Asset Owners that do business around the world are facing an increasingly ...
Breaking News: Ukrainian Power Grid Hack Marina Krotofil , Oleksiy Yasinskiy Ukraine is the sight of the latest ICS cyber attack again just prior to S4. ...
Security Economics for an Engineering, Procurement and Construction (EPC) Company and Their Customer Samuel Linares Industrial companies and critical infrastructures want to have cybersecurity injected in their projects, processes and ...
History of Industrial Cyber (in)Security – The Mashup Graham Speake , Clint Bodungen This presentation will take a look at the history of the industrial cyber world from ...
From WTF to CTF Kevin Geneva Drawing from case studies, security engineering, 3rd party reports and our own experiences with vulnerability ...
Down the Rabbit Hole: Insights from Real-World ICS Vulnerability Assessments & Threat Research Phil Neray According to Deloitte, 31% of manufacturers have never conducted a vulnerability assessment, and 50% only ...
Steps and Tips to Make Your Next Cybersecurity Project Successful! Ken Keiser , James Williams Grab your lunch and come join us for a BEER on Parsons! An EPC (Engineering ...
Effective ICS Resilience – A Critical Review of Cyber Security Best Practice Recommendations Joel Langill Threats to infrastructure are increasing at an alarming rate. Success of the adversary to this ...
Practical ICS Security: Lessons Learned from 12,000 Deployments Yehonatan Kfir In this presentation we will share some practical insights about the challenges in deploying security ...
Critical Infrastructure v. Botnet Attacks – Winner Takes All Sean Mcbride , Erik Schweigert In 2016 there are 5.5 million connected devices being added per day with a minimum ...
Cybersecurity Services for the Next Level of Automation Joshua Carlson Driven by business sustainability requirements, access to (near) real-time data within the automation industry has ...
Rolling in the Deep: Why OT Specific DPI is Necessary for Complete Operational Awareness Matt Cowell In order for anomaly detection to be effective, it needs to holistically discern deviations from ...
The Antikernel - Hardware and Unprivileged Software Andrew Zonenberg Modular design has long been used in critical systems in order to ease verification and ...
STIX and Stones... and your Security Controls Stephan Chenette , Daniel Michaud-soucy This session will focus on leveraging machine readable threat intelligence, specifically Structured Threat Information eXpression ...
Secure Modbus With Role Based Authorization Daniel Clarke Daniel Clarke of Schneider Electric provides all the technical details on a Secure Modbus protocol ...
Digital Forensics and Incident Response for PLC's and Other Embedded Devices Chris Sistrunk , Devon Kerr On Friday there is a full day course on this topic, but for those that ...
How Deep Is Your ICS Deep Packet Inspection? Amir Preminger NextGen Firewalls, Anomaly Detection, IPS, and Industrial Gateway devices are adding deep packet inspection (DPI) ...
Tools for Practical Attacks on Analog-to-Digital Converter Alexander Bolshev We live in the analog world but program and develop digital systems. The key element ...
Analysis of IoT Botnet Techniques David Atch The CCTV-IoT botnet that hit Krebs and others with DDoS attacks introduced new techniques in ...
Keynote: D. Renee Tarun, Deputy Special Assistant to the Director, NSA for Cyber D. Renee Tarun Ms. Tarun is the Deputy Special Assistant to the Director, NSA for Cyber and Deputy ...
An Interview with Justine Bone, CEO of Medsec Justine Bone Medsec made the news in August when they released information on vulnerabilities in St. Jude's ...
Identifying the Malicious Insider Eric Shaw Dr. Shaw will review the problematic personal characteristics and experiences past insiders have brought to ...
PLC Attacks That Avoid Active Detection Efforts Majid Hashemi This session investigates attacks against PLCs from two different perspectives. We show how to circumvent ...
Ransomware in ICS ... It Begins Marcelo Ayres Branquinho We have moved from theory to practice. This session will go over the details of ...
The Industrial Internet of Things (IIOT): Great benefits, increasing security vulnerabilities Stuart Bailey The increase in the potential attack surface brought on by the IIOT is of great ...
Industry Impacts of Ransomware Mark Stacey Ransomware is not new but quickly escalated to a respectable threat grabbing the attention of ...
IoT and ICS - Functional Safety Meets Cybersecurity Nigel Stanley , Joerg Krämer The challenge of Industry 4.0 is to address requirements of Functional Safety and Security and ...
Automatic Generation of Process Models Using Motion Acceleration Algorithms Jason Larsen Trivial disruption of a process is easy. Almost everything can cause a process to shut ...
Integrating ICS Into Your Enterprise SIEM And Monitoring Strategy Terry Mccorkle The number of products focused on detecting security events and incidents on ICS is growing ...
Day 3 Keynote - Richard Clarke Richard Clarke Richard Clarke is the former U.S. National Coordinator for Security, Infrastructure Protection and Counter-terrorism and ...
Intelligent Control Systems: How Machine Learning Can Transform ICS Kathryn Hume Now that it's possible and affordable to collect, store, and process data from industrial systems, ...
Interview with ExxonMobil on Next Generation / Open Automation System Dale Peterson ExxonMobil is leading a bold industry initiative to create an open and secure automation system. ...
ICSsec 101 - Meet The High School Students Matthew Luallen How many skilled ICS security practitioners are there today? 1000? 5000? Whatever number you believe, ...
THE Simple Solution To Securing ICS In An IoT World Dale Peterson The world is abuzz with the Internet of Things, and for good reason. But how ...
Cyber PHA (Process Hazard Analysis) John Cusimano , Chris Da Costa Many plants and processes that have a safety concern perform and update a Process Hazards ...
Fun & Effective Cybersecurity Training??? It's Applied Fiction Lisa Carrington , Christopher Lazarro Imagine our employees transformed into an army of cyber-security Defenders. Imagine them on a quest ...
Mentoring for Fun and Non-Profit Marc Blackmer When it comes to ICS security, we desperately need help in the field. But we ...
Become an ICS Jedi; Learning the FORCE of Deep Packet Inspection…. and beyond Andrea Carcano ICS Jedi’s must master their own version of the FORCE. This session will provide instruction ...
Little Green Men, Industrial Cybersecurity, and Life As We Know It David Zahn Do aliens exist? If so, why have we not had a confirmed visit? Why have ...
Evaluating Active Vs Passive Approaches to Securing the Industrial Internet of Things Francis Cianfrocca As IT and OT networks, systems, and cultures converge, many claims and counterclaims pitting active ...
Mandiant Tales from the Trenches: Hunting for Evil in ICS Networks Dan Scali Dan Scali from Mandiant will share a collection of anonymized anecdotes about compromised and vulnerable ...
Tying Bow Ties: From PHA To The Cloud Will Price , Harry Paul Bow Tie risk assessment methodology has traditionally been used to analyze safety, but more recently, ...
Secure SCADA Protocol for the 21st Century (SSP21) Adam Crain , Rich Corrigan Most SCADA protocols have no security, but will continue to be used in ICS for ...
How Deep Is Your Deep Packet Inspection? Erik Schweigert NextGen Firewalls, Anomaly Detection, IPS, and Industrial Gateway devices are adding deep packet inspection (DPI) ...
Detecting Counterfeit Smart Grid Devices A. Selcuk Uluagac The potential use of counterfeit smart grid devices throughout the smart grid represents a real ...
Economic Analysis of ICS Attack Consequences Alvaro A. Cárdenas Alvaro has performed a detailed analysis of the economic impact of an attack on a ...
DFIR for PLC's (and other devices with embedded OS) Chris Sistrunk , Devon Kerr Attacks against industrial control systems (ICS) are on the rise. In order to effectively respond ...