Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Security Infrastructure

2014 ICS Cyber Security Conference to Take Place October 20-23 in Atlanta, Georgia

The 2014 Industrial Control System (ICS) Cyber Security Conference will be held October 20 – 23, 2014 at the Georgia Tech Hotel and Conference Center in Atlanta, Georgia, USA.

The 2014 Industrial Control System (ICS) Cyber Security Conference will be held October 20 – 23, 2014 at the Georgia Tech Hotel and Conference Center in Atlanta, Georgia, USA.

As the longest-running cyber security-focused conference for the industrial control systems sector, the event will cater to the energy, utility, chemical, transportation, manufacturing, and other industrial and critical infrastructure organizations.

The conference will address topics covering ICSs, including protection for SCADA systems, plant control systems, engineering workstations, substation equipment, programmable logic controllers (PLCs), and other field control system devices.

“The IT community and ICS community are now bridging the security gap,” said Joe Weiss, founder of the ICS Cybersecurity Conference, which was recently acquired by SecurityWeek“The value to attendees at the ICS Cybersecurity Conference is inherent with the robust exchange of technical information, actual incidents, insights and best practices to help protect critical infrastructures from cyber attacks.”

2014 ICS Cyber Security Conference

“It has become paramount that critical infrastructures balance the needs of ICS reliability and safety with cyber security,” Weiss added.

The Conference is unique as it focuses on control system end-users from various industries and what cyber vulnerabilities mean to control system reliability and safe operation. It also has a history of having discussions of actual ICS cyber incidents.

Bigger and better than ever before, select sessions of interest will include:

• A summary and status of the two utilities performing Aurora hardware mitigation projects in conjunction with the Department of Defense (DOD)

Advertisement. Scroll to continue reading.

• A summary and status of the two utility ICS cyber security test beds (the equipment is the same as in water, oil/gas, pipelines, chemicals, etc.)

• A summary and status of the DOD ICS cyber security test bed

• A summary of the recovery and remediation actions from one the most significant ICS cyber incidents to date – complete loss of DCS logic with plants at power

• A summary of Project Shine findings

• Discussions of recent non-North American ICS cyber incidents

As with previous ICS Cyber Security Conferences, the agenda will not be complete until shortly before the conference to accommodate the most current issues and findings.

The industrial infrastructure sector’s need for remote access and adoption of Internet-facing technologies have created significant vulnerabilities that must be addressed. In the extraordinarily broad world of cyber systems, the critical industrial infrastructure sector has had more than its fair share of unintentional cyber incidents as well as cyber attacks.

To date, unintentional cyber incidents and actual cyber attacks have resulted in multiple deaths and hundreds of millions of dollars in damages across almost all industrial sectors worldwide.

The only way to address the ICS cyber security problem is to join the strengths of the ICS community’s domain knowledge and the IT community’s cyber security knowledge. O

Online registration will be available this week along with a call for papers. For conference registration and sponsorship information please contact SecurityWeek.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Management & Strategy

Hundreds of companies are showcasing their products and services this week at the 2023 edition of the RSA Conference in San Francisco.

Security Infrastructure

Security vendor consolidation is picking up steam with good reason. Everyone wants to improve security efficiency and effectiveness while paying for less.

Cloud Security

The term ‘zero trust’ is now used so much and so widely that it has almost lost its meaning.

Funding/M&A

Responding to Cyber Threats Against Critical Infrastructures: Wired Business Media Acquires Long Running ICS Cybersecurity Conference Series

Security Infrastructure

Instead of deploying new point products, CISOs should consider sourcing technologies from vendors that develop products designed to work together as part of a...

Audits

The PCI Security Standards Council (SSC), the organization that oversees the Payment Card Industry Data Security Standard (PCI DSS), this week announced the release...

Security Infrastructure

Comcast jumps into the enterprise cybersecurity business, betting that its internal security tools and inventions can find traction in an expanding marketplace.