ICSCyberSecurityConference 2020 Aug. 16, 2020 to Aug. 18, 2020, Virtual, Virtual
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Microsoft's Data Center Security Strategy | Imran Mohiuddin | Microsoft datacenters constitute a complex industrial-scale facility sitting at the intersection of operational technologies (OT) ... | |
COVID-19 Ramifications on Industrial Platforms Cybersecurity: Lessons Learned | Ayman Al Issa | N/A | |
ICS and DX Cyber Challenges in a Two-Speed Architecture | Stephen Kraemer | Using Ports of Auckland as a Case Study, this presentation confronts foundational cybersecurity convergence issues ... | |
[Panel] Cyber in Critical Infrastructure – Enabling the Convergence of OT & IT | Lani Refiti , Jeff Campbell , Vinod Foo | Critical infrastructure, which is primarily OT/ICS related is undergoing a shift from isolated and air-gapped ... | |
Securing IIoT – Can Industrial Devices Take Your Network Down? | Dennis Carpio | With the Internet of Things (IoT) bringing industrial devices online, cyber defenses must extend to ... | |
Public and Private, The Common Flaws in ICS Communication Protocols | Mars Yang | ICS communication protocols play an important role in communicating with HMIs and PLCs or PLCs ... | |
Hacking Industry 4.0 With CNC Vulnerabilities | Sergey Sidorov | Industry 4.0 is leading manufacturing industry by interconnecting factories and construction offices. And CNC machines ... | |
A Practical Way to Test OT Security Mechanisms in Real-life Scenarios | Matan Helzer | IT/OT Convergence is a major challenge for industrial organizations on the path to digitalization.The volume ... | |
What Cybersecurity Lessons Can Physical Security Learn From Industrial Control Systems? | Michael Firstenberg | Over the past two decades, there has been a significant shift in the world of ... | |
The Journey of ICS Project Files - Visibility and Forensics to Explotiablity | Nadav Erez | The first challenge a CISO faces when securing the OT network is creating a comprehensive, ... | |
Understanding Worm-Like Malware's Network Propagation to Control Networks | Yihao Lim | Since the convergence of information technology (IT) and operational technology (OT), OT networks have been ... | |
Building and Managing an Integrated IT/OT SOC to Support Heavy Industry | Nitin Jhunjhunwala | With numerous plants around the world, a global heavy industry leader is making significant investments ... | |
Will 5G Be a Friend or Foe to Smart Cities? | William Malik | One of the biggest challenges to the idea of the smart city was the bandwidth ... | |
Managing Uncertainty: Increasing OT Cyber Resilience through Intelligence Sharing | John Lee | We are seeing an increase of attacks on Industrial Control Systems (ICS) and critical infrastructures. ... | |
Deceiving ICS Insider Threats | Mike Rebultan | While the presence of EDR, EPP, DPI, DLP, EUBA, SIEM, and Network Monitoring Systems in ... | |
Managing Vulnerabilities in Open Source Components in ICS | Sz Lin | Open source components are becoming essential components in industrial control systems and critical infrastructure. It's ... | |
SNAKEHOSE Ransomware Kills Some OT/ICS Processes, Potentially to Increase Impact | Yihao Lim | Ransomware tracked by FireEye as SNAKEHOSE (aka SNAKE) is a ransomware family written in Go ... |