Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

NSA Cyber Chief to Keynote 2015 ICS Cyber Security Conference

SecurityWeek is proud to announce that Philip D. Quade, Chief of the NSA Cyber Task Force and Special Assistant to the Director National Security Agency for Cyber, will deliver a keynote address at the 2015 ICS Cyber Security Conference, taking place Oct. 26-29 in Atlanta, Georgia.

SecurityWeek is proud to announce that Philip D. Quade, Chief of the NSA Cyber Task Force and Special Assistant to the Director National Security Agency for Cyber, will deliver a keynote address at the 2015 ICS Cyber Security Conference, taking place Oct. 26-29 in Atlanta, Georgia.

On the morning of Oct. 27, Mr. Quade will deliver a keynote address titled “Protecting the Infrastructures on Which We Depend”.

Philip Quade - NSA

As industrial control systems start looking more like IT systems, and as our everyday environment starts looking more like ICS architectures, Mr. Quade will explain why stakeholders need to re-evaluate their strategies for ensuring that ICS continues to reliably underpin the missions and services on which we depend. With the ICS ‘attack surface’ growing substantially, Mr. Quade will address the roles we each of us might take to leverage each other’s unique insights and capabilities.

Now in its 13th year, SecurityWeek’s ICS Cyber Security Conference is the foremost and longest-running cyber security-focused event series for the industrial control systems sectors. The conference caters to the energy, water, utility, chemical, transportation, manufacturing, and other industrial and critical infrastructure organizations.

Immediately prior to his current role at the National Security Agency, Mr. Quade served the Chief Operating Officer of the Information Assurance Directorate at NSA, managing day-to-day operations, strategy, planning, integration, and relationships, in cybersecurity and related disciplines. He also served external to NSA as head of the Information Operations Technology Center’s Advanced Technology Group, as a Professional Staffer at the US Senate, and at the Office of the Director of National Intelligence for a cross-discipline intelligence effort. Previous assignments at NSA include serving as a computer scientist, cryptanalyst, computer & network security evaluator, and a variety of policy, program management, and resource jobs.

ICS Cyber Security ConferenceRegistration is $1895 ($1695 Gov/Mil) and includes a full day of workshops and training and a total of four days of content. Registration and additional information is available online at www.icscybersecurityconference.com.

Since 2002, the ICS Cyber Security Conference has gathered ICS cyber security stakeholders across various industries and attracts operations and control engineers, IT, government, vendors and academics. The conference will address the myriad cyber threats facing operators of ICS around the world, with topics including protection for SCADA systems, plant control systems, engineering workstations, substation equipment, programmable logic controllers (PLCs), and other field control system devices.

2015 Sponsors Include: Lockheed Martin, Symantec, Waterfall Security, Bedrock Automation, Honeywell, NexDefense, ThreatStream, Intel Security, Cybereason, Cisco, Veracity, Darktrace, Peach Fuzzer, Check Point Software Technologies, and FireEye.

SecurityWeek has also formed a strategic alliance with the Industrial Control System Information Sharing and Analysis Center for the 2015 conference.

Advertisement. Scroll to continue reading.
Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

ICS/OT

Wago has patched critical vulnerabilities that can allow hackers to take complete control of its programmable logic controllers (PLCs).

Cybercrime

Energy giants Schneider Electric and Siemens Energy confirm being targeted by the Cl0p ransomware group in the campaign exploiting a MOVEit zero-day.

ICS/OT

Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.

ICS/OT

Municipal Water Authority of Aliquippa in Pennsylvania confirms that hackers took control of a booster station, but says no risk to drinking water or...

ICS/OT

Mandiant's Chief analyst urges critical infrastructure defenders to work on finding and removing traces of Volt Typhoon, a Chinese government-backed hacking team caught in...