ICSCyberSecurityConference 2020 Oct. 19, 2020 to Oct. 21, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The ICS Risk & Vulnerability Landscape: What You Need to Know Rotem Fradkin This session will examine the global state of the ICS risk & vulnerability landscape.Topics covered ...
Assessment Done, Now What? How to Prioritize Remediation Activities and Identify Quick Wins Jalal Bouhdada With recent emerging cybersecurity threats and increased regulatory compliance requirements, many organizations are shifting their ...
[Panel] Stories from the Edge John Walsh , Jonathan Lloyd White , Pete Tseronis , Jim Mccarthy , Shanna Ramirez Innovation and disruption often play out at the boundary, or edge, of established and well-understood ...
Using Attack Path Mapping to Reduce Risk and Cost in ICS Environments (F-Secure) Sean Raffetto Attack Path Mapping (APM) is an innovative approach that some companies have found to be ...
SAE G-32 Cyber-Physical System Security Standard and impact on ICS Chris Sundberg Traditionally, cybersecurity has been defined (Merriam Webster) as "measures taken to protect a computer or ...
What Does a Complete OT Security Program Look Like? What Are We Missing? Rob Dyson Many organizations have started building out their OT security programs, but what does a good ...
Improving Cybersecurity Posture of Industrial Control Systems ("ICS") with Purple Teaming Pak Wong Securing digital transformation of ICS through the eyes of hackers. Since the ICS is becoming ...
Panel: Bringing OT & IT Together for Stronger Integrated Security John Livingston , Rick Kaun , Jon Walker What the OT security neglects to address is the number of challenges faced by OT ...
Cybersecurity of Distributed Industrial Control Systems Hal Aldridge As legacy ICS systems evolve and new systems are deployed, their topology and connectivity can ...
Lost in Translation: When Industrial Protocol Translation Goes Wrong Dr. Marco Balduzzi Protocol gateways are embedded devices used in industrial facilities to integrate legacy equipment such as ...
Managing Your Risk Through Situational Awareness Chris Sandford An ever-changing threat landscape has highlighted the importance for organizations to be Situation Aware when ...
Making Threat Modeling Work Across Industrial Product Verticals Dr. Crowther This session talks about the different requirements and styles of threat modeling across the businesses ...
Open Security – From Patchwork to Platform Patrick Vowles As organization adopt new technologies and utilize the cloud for business innovation and growth, security ...
What Your ICS/DCS/SCADA Vendor Doesn’t Want You to Know Anas Falodah , Anas Alrushaid You’re a CIO, CISO or IT Security Manager - and you wake up in the ...
Defining the Next-Generation of Security as IT and OT Converge Del Rodillas The convergence of information technology (IT) and operational technology (OT) environments is creating new opportunities ...
OT Penetration Testing Framework Reconsidered Matan Rudis Penetration testing in OT environments is a developing concept. Yet while organizations understand the importance ...
Identifying Process Structure and Parameters Using Side-channel Information Raheem Beyah , Chuadhry Mujeeb Ahmed , Qinchen Gu When securing a cyber-physical system (CPS), the most commonly used methods focus CPS itself, including ...
Data Breaches Related to Critical Infrastructure - Analysis of Cyber Risk to U.S. Critical Infrastructure Mars Cheng , Yenting Lee , Max Farrell In recent years, many enterprises in the world have suffered from leaks of sensitive customer ...
Discovering and Exploiting New Vulnerabilities in Remote Connection Solutions Yoav Flint Rosenfeld Industrial remote connection solutions, such as IIoT connectors and industrial VPNs are one of the ...
Developing a Critical Infrastructure Ransomware Dataset From the Ground Up Aunshul Bleiman This talk presents the efforts of a team of criminologists to develop a critical infrastructure ...
Examining USB Attack Platforms (UAPs) and Their Impact on ICS Eric Knapp According to the 2019 SANS State of ICS Cybersecurity Survey, direct physical access is the ...
Zero Trust Industrial Control - What Can We Learn From Decades of Functional Safety Aaron Fenwick Trains, Trucks, Ships, Drills, Power Stations, Oil Platforms and other process control networks are increasingly ...
The Future of the Threat Intelligence and Hunting in ICS Felipe Costa The industrial control systems are living a new era of digitalization, bringing several needed automation ...
ICS Attacks Aren't Evolving, They Are Devolving James Cabe Industrial Control System attacks have been around for several years. Most of them started with ...
IT vs. OT: Comparing Process Control Room and SOC Operations Marina Krotofil Partially because the industry is now exposed to security threats such as external connectivity to ...
Mitigating OT Cyber Risk by Securing the OT Network Layer Rick Sanchez Industrial organizations manage expensive and sophisticated equipment at their facilities—and the systems that run the ...
Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending! Imran Mohiuddin , Israel Emmanuel , Bugra Karabey N/A
Enabling Secure & Safe Remote Industrial Operations Matthew Selheimer The executive desire for a shift to remote work within the oil and natural gas ...
Evaluating Volatile Memory Forensics Techniques for Embedded Devices Phd , Rima Jr. With the increased number and sophistication of cyber-attacks, digital forensics has proven to be a ...
Lurking Beneath the Surface: Uncovering Hidden Components in ICS Software Eric Byres Today’s ICS software is never written from scratch. Vendors focus development resources on core competencies ...
[Encore] From the Trenches: OT Security Transformation and Innovation Ben Brager This exclusive discussion took place at SecurityWeek's 2020 ICS Lockdown Virtual Event on July 9, ...