s4x17 2017 Jan. 10, 2017 to Jan. 13, 2017, miami,usa
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Come Together! | Dale Peterson | Dale Peterson kicks off S4x17 with a mini-keynote to introduce the theme of the event: ... | |
Keynote: Protecting National Assets Against Nation State Threats | Mary Mccord | Mary B. McCord is the Acting Assistant Attorney General and Principal Deputy Assistant Attorney General ... | |
News From Ukraine | Marina Krotofil | A quick, 15-minute preview of a longer talk in the afternoon. This session will provide ... | |
Sitting Under the Industrial Sword of Damocles: Four Predictions Everyone Must Consider | Michael J. Assante | The new age of automation will present immense wealth, luxury and power to its masters ... | |
Uncomfortable Truths Require Uncomfortable Response | Joshua Corman | CyberPolicy is upon us. Ready or not, like it or not, the public policy world ... | |
MUD - To Help Secure IoT | Marc Blackmer | This session will describe the basics and purpose of the Manufacturer Usage Description (MUD) protocol, ... | |
Panel: Will ICS Certification Make A Difference ... And When? | Dale Peterson , Paul Forney , Kenneth Modeste | We have a growing number of ICS cybersecurity certification efforts, but arguably none have become ... | |
Cyber Nationalism: How Nations’ Offensive and Defensive Ops Affect All of Us | Ben Buchanan | ICS Vendors and Asset Owners that do business around the world are facing an increasingly ... | |
Breaking News: Ukrainian Power Grid Hack | Marina Krotofil , Oleksiy Yasinskiy | Ukraine is the sight of the latest ICS cyber attack again just prior to S4. ... | |
Security Economics for an Engineering, Procurement and Construction (EPC) Company and Their Customer | Samuel Linares | Industrial companies and critical infrastructures want to have cybersecurity injected in their projects, processes and ... | |
History of Industrial Cyber (in)Security – The Mashup | Graham Speake , Clint Bodungen | This presentation will take a look at the history of the industrial cyber world from ... | |
From WTF to CTF | Kevin Geneva | Drawing from case studies, security engineering, 3rd party reports and our own experiences with vulnerability ... | |
Down the Rabbit Hole: Insights from Real-World ICS Vulnerability Assessments & Threat Research | Phil Neray | According to Deloitte, 31% of manufacturers have never conducted a vulnerability assessment, and 50% only ... | |
Steps and Tips to Make Your Next Cybersecurity Project Successful! | Ken Keiser , James Williams | Grab your lunch and come join us for a BEER on Parsons! An EPC (Engineering ... | |
Effective ICS Resilience – A Critical Review of Cyber Security Best Practice Recommendations | Joel Langill | Threats to infrastructure are increasing at an alarming rate. Success of the adversary to this ... | |
Practical ICS Security: Lessons Learned from 12,000 Deployments | Yehonatan Kfir | In this presentation we will share some practical insights about the challenges in deploying security ... | |
Critical Infrastructure v. Botnet Attacks – Winner Takes All | Sean Mcbride , Erik Schweigert | In 2016 there are 5.5 million connected devices being added per day with a minimum ... | |
Cybersecurity Services for the Next Level of Automation | Joshua Carlson | Driven by business sustainability requirements, access to (near) real-time data within the automation industry has ... | |
Rolling in the Deep: Why OT Specific DPI is Necessary for Complete Operational Awareness | Matt Cowell | In order for anomaly detection to be effective, it needs to holistically discern deviations from ... | |
The Antikernel - Hardware and Unprivileged Software | Andrew Zonenberg | Modular design has long been used in critical systems in order to ease verification and ... | |
STIX and Stones... and your Security Controls | Stephan Chenette , Daniel Michaud-soucy | This session will focus on leveraging machine readable threat intelligence, specifically Structured Threat Information eXpression ... | |
Secure Modbus With Role Based Authorization | Daniel Clarke | Daniel Clarke of Schneider Electric provides all the technical details on a Secure Modbus protocol ... | |
Digital Forensics and Incident Response for PLC's and Other Embedded Devices | Chris Sistrunk , Devon Kerr | On Friday there is a full day course on this topic, but for those that ... | |
How Deep Is Your ICS Deep Packet Inspection? | Amir Preminger | NextGen Firewalls, Anomaly Detection, IPS, and Industrial Gateway devices are adding deep packet inspection (DPI) ... | |
Tools for Practical Attacks on Analog-to-Digital Converter | Alexander Bolshev | We live in the analog world but program and develop digital systems. The key element ... | |
Analysis of IoT Botnet Techniques | David Atch | The CCTV-IoT botnet that hit Krebs and others with DDoS attacks introduced new techniques in ... | |
Keynote: D. Renee Tarun, Deputy Special Assistant to the Director, NSA for Cyber | D. Renee Tarun | Ms. Tarun is the Deputy Special Assistant to the Director, NSA for Cyber and Deputy ... | |
An Interview with Justine Bone, CEO of Medsec | Justine Bone | Medsec made the news in August when they released information on vulnerabilities in St. Jude's ... | |
Identifying the Malicious Insider | Eric Shaw | Dr. Shaw will review the problematic personal characteristics and experiences past insiders have brought to ... | |
PLC Attacks That Avoid Active Detection Efforts | Majid Hashemi | This session investigates attacks against PLCs from two different perspectives. We show how to circumvent ... | |
Ransomware in ICS ... It Begins | Marcelo Ayres Branquinho | We have moved from theory to practice. This session will go over the details of ... | |
The Industrial Internet of Things (IIOT): Great benefits, increasing security vulnerabilities | Stuart Bailey | The increase in the potential attack surface brought on by the IIOT is of great ... | |
Industry Impacts of Ransomware | Mark Stacey | Ransomware is not new but quickly escalated to a respectable threat grabbing the attention of ... | |
IoT and ICS - Functional Safety Meets Cybersecurity | Nigel Stanley , Joerg Krämer | The challenge of Industry 4.0 is to address requirements of Functional Safety and Security and ... | |
Automatic Generation of Process Models Using Motion Acceleration Algorithms | Jason Larsen | Trivial disruption of a process is easy. Almost everything can cause a process to shut ... | |
Integrating ICS Into Your Enterprise SIEM And Monitoring Strategy | Terry Mccorkle | The number of products focused on detecting security events and incidents on ICS is growing ... | |
Day 3 Keynote - Richard Clarke | Richard Clarke | Richard Clarke is the former U.S. National Coordinator for Security, Infrastructure Protection and Counter-terrorism and ... | |
Intelligent Control Systems: How Machine Learning Can Transform ICS | Kathryn Hume | Now that it's possible and affordable to collect, store, and process data from industrial systems, ... | |
Interview with ExxonMobil on Next Generation / Open Automation System | Dale Peterson | ExxonMobil is leading a bold industry initiative to create an open and secure automation system. ... | |
ICSsec 101 - Meet The High School Students | Matthew Luallen | How many skilled ICS security practitioners are there today? 1000? 5000? Whatever number you believe, ... | |
THE Simple Solution To Securing ICS In An IoT World | Dale Peterson | The world is abuzz with the Internet of Things, and for good reason. But how ... | |
Cyber PHA (Process Hazard Analysis) | John Cusimano , Chris Da Costa | Many plants and processes that have a safety concern perform and update a Process Hazards ... | |
Fun & Effective Cybersecurity Training??? It's Applied Fiction | Lisa Carrington , Christopher Lazarro | Imagine our employees transformed into an army of cyber-security Defenders. Imagine them on a quest ... | |
Mentoring for Fun and Non-Profit | Marc Blackmer | When it comes to ICS security, we desperately need help in the field. But we ... | |
Become an ICS Jedi; Learning the FORCE of Deep Packet Inspection…. and beyond | Andrea Carcano | ICS Jedi’s must master their own version of the FORCE. This session will provide instruction ... | |
Little Green Men, Industrial Cybersecurity, and Life As We Know It | David Zahn | Do aliens exist? If so, why have we not had a confirmed visit? Why have ... | |
Evaluating Active Vs Passive Approaches to Securing the Industrial Internet of Things | Francis Cianfrocca | As IT and OT networks, systems, and cultures converge, many claims and counterclaims pitting active ... | |
Mandiant Tales from the Trenches: Hunting for Evil in ICS Networks | Dan Scali | Dan Scali from Mandiant will share a collection of anonymized anecdotes about compromised and vulnerable ... | |
Tying Bow Ties: From PHA To The Cloud | Will Price , Harry Paul | Bow Tie risk assessment methodology has traditionally been used to analyze safety, but more recently, ... | |
Secure SCADA Protocol for the 21st Century (SSP21) | Adam Crain , Rich Corrigan | Most SCADA protocols have no security, but will continue to be used in ICS for ... | |
How Deep Is Your Deep Packet Inspection? | Erik Schweigert | NextGen Firewalls, Anomaly Detection, IPS, and Industrial Gateway devices are adding deep packet inspection (DPI) ... | |
Detecting Counterfeit Smart Grid Devices | A. Selcuk Uluagac | The potential use of counterfeit smart grid devices throughout the smart grid represents a real ... | |
Economic Analysis of ICS Attack Consequences | Alvaro A. Cárdenas | Alvaro has performed a detailed analysis of the economic impact of an attack on a ... | |
DFIR for PLC's (and other devices with embedded OS) | Chris Sistrunk , Devon Kerr | Attacks against industrial control systems (ICS) are on the rise. In order to effectively respond ... |