ICScybersecCon 2014 Oct. 20, 2014 to Oct. 23, 2014, atlanta,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Welcome address and conference introduction for the 2014 ICS Cyber Security Conference. – Michael Lennon, Founder and Managing Director, SecurityWeek Mike Lennon N/A
Current Industry Status Joe Weiss N/A
ICSCorsair: How I will PWN your ERP through 4-20 mA current loop Svetlana Cherkasova Currently, ICSCorsair provides tools and abilities for attacking HART and Modbus industrial protocols. Using deep ...
Best Practices on Implementing Modern IT Security Technologies and Applying them to OT Environments Richard Devera The convergence of Information Technology (IT) and Operational Technology (OT) has introduced new challenges in ...
Securing ICS from “Safe” Devices Turned Killers Alex Tarter USB stick and CD-ROM based attacks are largely yesterday’s technology. Fake and infected PLCs, cables ...
Strengthening DCS Processors and Networks – Recovery from a Significant ICS Cyber Incident Anoop Kesavan Distributed Control Systems (DCS) are extensively used in power plants for end-to-end plant requirements including ...
Integrating The Alphabet Soup of Standards Jim Gilsinn It’s been over a year since the NIST Cybersecurity Framework and ISA-62443-3-3 were published, ISA-62443-2-1 ...
Observations and Conclusions from Project SHINE - ICSs Connected to the Internet Bob Radvanovsky In this session, Rob Radvanosky will share the results of a two-year study about critical ...
Centralized Cyber Security Management and Secure Remote Access to ICS/SCADA Systems for Critical Infrastructure Companies with Globally Dispersed Assets; including case study and lessons learned from Michael Coden , Matt Morris NextNine and Cisco, working in partnership with a major oil company, have deployed a solution ...
Observations for Improved ICS Reliability and Security Albert Rooyakkers Simple, Scalable, Secure: With a clean sheet of paper and three prime directives, a revolutionary ...
Big Data Use in Identifying Cyber and Operational Threats Mark Gazit The adoption of connected, Internet-facing technology, remote access, and mobility has created vulnerable spaces for ...
15 incidents in 15 minutes Bryan Owen This presentation covers 15 cyber incidents from around the world that affected OSIsoft products and ...
Discussion on Unisys Report for Critical Infrastructure – How Applicable is it? Larry Ponemon , Dave Frymier Discussion on Unisys Report for Critical Infrastructure – How Applicable is it?
Approach to Identify Consequences of Cyber Vulnerabilities Eric C. Cosman Not all vulnerabilities are created equal. In planning the response to an announced vulnerability in ...
DOD ICS Cyber Security Test Bed Navy Facilities Utility Test Bed Status and results to date
Just How Easy is it to Hack a DCS? Alex Tarter How easy is it to hack a DCS? This session will be based on specialist ...
Patch Management in the Industrial Automation and Control Systems Environment Donovan Tindill , William J Cotter ISA99 Work Group 6 is finalizing guidelines for control systems patch management that will be ...
Aurora discussions – Review of INL Test; Relay Vulnerabilities Affecting Aurora Navy Division Aurora discussions – Review of INL test; relay vulnerabilities affecting Aurora; Aurora myths; and utility ...
Aurora Hardware Mitigation: Utility Test Bed Status and Results to Date Steve Brunasso , Jeff Stebbins We are a moderate sized Electric Cooperative and we have provided a distribution substation as ...
How Managing Privileged Accounts Can Help You With Maintaining NERC CIP Requirements Yariv Lenchner Allowing remote connectivity to critical Industrial Control Systems (ICS) and other Operational Technology (OT) has ...
Why ICS Organizations and AV Security Vendors See ICS Cyber Security Differently Alexey Polyakov SCADA security was one of the important topic over last few years. Security vendors see ...
Analysis of Cyber Security Compliance and Laboratory Design for Pentesting in a Brazilian Substation Leonardo Leite Intelligent Energy Networks and Smart Grids recommend the use of new communication systems, sensing and ...
Deploying Unidirectional Gateways to Secure Offshore Platforms Lior Frenkel Deploying unidirectional gateways to secure offshore platforms - a Case Study. A leading O&G company ...
Simple, Scalable, Secure…The Future is Now! Albert Rooyakkers Bedrock Automation asked “what would it take to design a control system strong enough for ...
Air Force Institute of Technology Efforts on ICS Cyber Security Juan Lopez Jr. Air Force Institute of Technology efforts on ICS cyber security.
SPIDERS - Cybersecurity in Microgrids- Security and Resiliency for Facilities and Utilities Fred Terry In the same way that a microgrid is the grid in miniature, its secure network ...
5 Steps To Building a Successful ICS Cyber Security Program Scott Timmer Building a successful ICS cyber security program can be extremely challenging. In spite of cyber ...
Deep Dive into RIPE Methodology Perry Pederson The RIPE Cyber Security and Robustness Program - Bringing Quality Management to ICS Security
Scaling Building Automation Defense Billy Rios Modern facilities (such as corporate headquarters) are marvels of engineering. These buildings employ numerous embedded ...
Adapting Safety Strategies to your ICS Security Program Donovan Tindill Health, safety, and environment (HSE) programs are deeply ingrained in every organization and industrial site ...
Lessons Learned from Onsite Industrial Security Assessments Michael Fabian Security best practices have long called for a defense-in-depth approach that includes a comprehensive security ...
Secure Authentication for End-point Devices Including ICS Field Devices Shrinath Eswarahally Advancements in Supervisory Control and Data Acquisition (SCADA), Distribute Control System (DCS), Process Control System ...