Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Security Infrastructure

2014 ICS Cyber Security Conference Call for Presentations Now Open

Longest Running ICS Cyber Security Conference Opens Call for Presentations for 2014 Event in Atlanta, Georgia

Longest Running ICS Cyber Security Conference Opens Call for Presentations for 2014 Event in Atlanta, Georgia

SecurityWeek today announced the official Call for Presentations for the 2014 Industrial Control Systems (ICS) Cyber Security Conference, to be held October 20 – 23, 2014 at the Georgia Tech Hotel and Conference Center in Atlanta, Georgia.

Now in its 12th year, the conference is the foremost and longest-running cyber security-focused event series for the industrial control systems sectors.

The conference will cater to the energy, water, utility, chemical, transportation, manufacturing, and other industrial and critical infrastructure organizations.

2014 ICS Cyber Security Conference Logo

Produced by SecurityWeek, the conference will address ICS/SCADA topics including protection for SCADA systems, plant control systems, engineering workstations, substation equipment, programmable logic controllers (PLCs), and other field control system devices.

The Conference is unique and has historically focused on control system end-users from various industries and what cyber vulnerabilities mean to control system reliability and safe operation. It also has a history of having discussions of actual ICS cyber incidents.

Through the Call for Presentations, a conference committee will accept speaker submissions for possible inclusion in the program at the 2014 ICS Cyber Security Conference.

 

Advertisement. Scroll to continue reading.

This year’s event features new “In Focus” tracks that will explore very specific subject and industry-specific areas of ICS and be limited to 70 attendees. Main track sessions and keynotes will accommodate 250 attendees.

 

The conference committee encourages proposals for both main track and and In Focus sessions. All sessions are 45 minutes in length including a Q&A.

 

The Conference Committee is particularly interested in submissions on the following topics: ICS/SCADA cyber incidents, results and observations from ICS/SCADA mitigation measures, results and observations from ICS/SCADA vulnerability assessments, and results and observations from joint IT/ICS projects.

 

To be considered, interested speakers should submit presentations proposals by email to [email protected] by August 15, 2014.


Submissions must include proposed presentation title, an informative session abstract, including learning objectives for attendees if relevant; and contact information and bio for the submitter.

All speakers must adhere to the 100% vendor neutral / no commercial policy of the conference. If speakers cannot respect this policy, they should not submit a proposal.

For questions regarding speaking opportunities please contact the events team at [email protected] 

“The IT community and ICS community are now bridging the security gap,” said Joe Weiss, founder of the ICS Cyber Security Conference, which was recently acquired by SecurityWeek. “The value to attendees at the conference is inherent with the robust exchange of technical information, actual incidents, insights and best practices to help protect critical infrastructures from cyber attacks.”

“It has become paramount that critical infrastructures balance the needs of ICS reliability and safety with cyber security,” Weiss added.

Following a sold out event in 2013, the 2014 Conference is expected to attract more than 250 professionals from around the world.

Selected speakers will receive a complimentary full conference pass good for all days of the 2014 Conference.

Plan on Attending the 2014 ICS Cyber Security Conference?

Online registration will be available shortly. For conference registration and sponsorship information please contact SecurityWeek. 

Sponsorship Opportunities

Sponsorship and exhibitor opportunities for the 2014 ICS Cyber Security Conference are available. Please contact [email protected] for information.

About the ICS Cyber Security conference:

The ICS Cyber Security Conference is the conference where ICS users, ICS vendors, system security providers and government representatives meet to discuss the latest cyber-incidents, analyze their causes and cooperate on solutions. Since its first edition in 2002, the conference has attracted a continually rising interest as both the stakes of critical infrastructure protection and the distinctiveness of securing ICSs become increasingly apparent.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

More People On The Move

Expert Insights

Related Content

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Management & Strategy

Hundreds of companies are showcasing their products and services this week at the 2023 edition of the RSA Conference in San Francisco.

Security Infrastructure

Security vendor consolidation is picking up steam with good reason. Everyone wants to improve security efficiency and effectiveness while paying for less.

Cloud Security

The term ‘zero trust’ is now used so much and so widely that it has almost lost its meaning.

Funding/M&A

Responding to Cyber Threats Against Critical Infrastructures: Wired Business Media Acquires Long Running ICS Cybersecurity Conference Series

Security Infrastructure

Instead of deploying new point products, CISOs should consider sourcing technologies from vendors that develop products designed to work together as part of a...

Audits

The PCI Security Standards Council (SSC), the organization that oversees the Payment Card Industry Data Security Standard (PCI DSS), this week announced the release...

Security Infrastructure

Comcast jumps into the enterprise cybersecurity business, betting that its internal security tools and inventions can find traction in an expanding marketplace.