CONFERENCE Cyber AI & Automation Summit - Watch Sessions
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

2015 ICS Cyber Security Conference Call for Papers Now Open

Longest Running ICS Cyber Security Conference Opens Call for Presentations for 2015 Event

Longest Running ICS Cyber Security Conference Opens Call for Presentations for 2015 Event

The official Call for Papers for the 2015 Industrial Control Systems (ICS) Cyber Security Conference, to be held October 26 – 29, 2015 at the Georgia Tech Hotel and Conference Center in Atlanta, Ga., is now open.

The conference is the foremost and longest-running cyber security-focused event series for the industrial control systems sectors and caters to the energy, water, utility, chemical, transportation, manufacturing, and other industrial and critical infrastructure organizations.

With a long 13-year history, the conference has proven to bring value to attendees through the robust exchange of technical information, actual incidents, insights, and best practices to help protect critical infrastructures from cyber attacks.

ICS Cyber Security Conference LogoProduced by SecurityWeek, the conference addresses ICS/SCADA topics including protection for SCADA systems, plant control systems, engineering workstations, substation equipment, programmable logic controllers (PLCs), and other field control system devices.

The Conference is unique and has historically focused on control system end-users from various industries and what cyber vulnerabilities mean to control system reliability and safe operation. It also has a history of having discussions of actual ICS cyber incidents.

Through the Call for Papers, a conference committee will accept speaker submissions for possible inclusion in the program at the 2015 ICS Cyber Security Conference.

The conference committee encourages proposals for main track and breakout sessions, as well as training and workshops. All sessions are 45 minutes in length including Q&A.

The Conference Committee is particularly interested in submissions on the following topics: ICS/SCADA cyber incidents, results and observations from ICS/SCADA mitigation measures, results and observations from ICS/SCADA vulnerability assessments, live attack demonstrations, vulnerabilities and exploits, and results and observations from joint IT/ICS projects.

Advertisement. Scroll to continue reading.

To be considered, interested speakers should submit proposals by email to events(at)www.securityweek.com with the subject line “ICS2015 CFP” by August 7, 2015.

Submissions must include proposed presentation title, an informative session abstract, including learning objectives for attendees if relevant; and contact information and bio for the submitter. All speakers must adhere to the 100% vendor neutral / no commercial policy of the conference. If speakers cannot respect this policy, they should not submit a proposal.

The 2015 Conference is expected to attract more than 250 professionals from around the world.

Plan on Attending the 2015 ICS Cyber Security Conference?

Online registration is now open, with discounts available for early registration. 

Sponsorship Opportunities

Sponsorship and exhibitor opportunities for the 2015 ICS Cyber Security Conference are available. Please contact SecurityWeek for information.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Don’t miss this Live Attack demonstration to learn how hackers operate and gain the knowledge to strengthen your defenses.

Register

Join us as we share best practices for uncovering risks and determining next steps when vetting external resources, implementing solutions, and procuring post-installation support.

Register

People on the Move

Shanta Kohli has been named CMO at Sysdig.

Cloud security firm Sysdig has appointed Sergej Epp as CISO.

F5 has appointed John Maddison as Chief Product Marketing and Technology Alliances Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.