Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

2017 Singapore ICS Cyber Security Conference Call for Papers is Open!

Singapore ICS/SCADA Security Conference Logo

Singapore ICS/SCADA Security Conference Logo

The Largest and Longest Running Cyber Security-focused Conference for the Industrial Control Systems (ICS) Sector is Coming to Singapore!

The official Call for Papers (presentations) for SecurityWeek’s 2017 Singapore Industrial Control Systems (ICS) Cyber Security Conference, being held April 25–27 at the Fairmont Singapore is now open.   

As the largest and longest-running cyber security-focused event series for the industrial control systems sectors, the conference caters to the energy, water, utility, chemical, transportation, manufacturing, and other industrial and critical infrastructure organizations.

With a long history, the conference has proven to bring value to attendees through the robust exchange of technical information, actual incidents, insights, and best practices to help protect critical infrastructures from cyber attacks.

Produced by SecurityWeek, the conference addresses ICS/SCADA topics including protection for SCADA systems, plant control systems, engineering workstations, substation equipment, programmable logic controllers (PLCs), and other field control system devices.

The Conference is unique and has historically focused on control system end-users from various industries and what cyber vulnerabilities mean to control system reliability and safe operation. It also has a long history of having discussions of actual ICS cyber incidents.

The 2017 Conference is expected to attract hundreds professionals from the Asia Pacific (APAC) region, including large critical infrastructure and industrial organizations, military and government officials.

Through the Call for Papers, a conference committee will accept speaker submissions for possible inclusion in the program at SecurityWeek’ 2017 ICS Cyber Security Conference | Singapore.

Advertisement. Scroll to continue reading.

The conference committee encourages proposals for both main track and “In Focus” sessions. All sessions are 45 minutes in length including Q&A.

The Conference Committee is particularly interested in submissions on the following topics: ICS/SCADA cyber incidents in the APAC region, results and observations from ICS/SCADA mitigation measures, results and observations from ICS/SCADA vulnerability assessments, live attack demonstrations, vulnerabilities and exploits, and results and observations from joint IT/ICS projects.

To be considered, interested speakers should submit proposals by email to events(at)www.securityweek.com with the subject line “ICSS2017 CFP” by February 28, 2017. Submissions will be reviewed on an ongoing basis so early submission is encouraged.

Submissions must include proposed presentation title, an informative session abstract, including learning objectives for attendees if relevant; and contact information and bio for the proposed speaker.

All speakers must adhere to the 100% vendor neutral / no commercial policy of the conference. If speakers cannot respect this policy, they should not submit a proposal.

Plan on Attending the 2017 ICS Cyber Security Conference | Singapore? Online registration is now open, with discounts available for early registration.

Sponsorship Opportunities


Sponsorship and exhibitor opportunities for SecurityWeek’s 2017 Singapore ICS Cyber Security Conference are available. Please contact events(at)www.securityweek.com for information.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

ICS/OT

Wago has patched critical vulnerabilities that can allow hackers to take complete control of its programmable logic controllers (PLCs).

Cybercrime

Energy giants Schneider Electric and Siemens Energy confirm being targeted by the Cl0p ransomware group in the campaign exploiting a MOVEit zero-day.

ICS/OT

Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.

ICS/OT

Municipal Water Authority of Aliquippa in Pennsylvania confirms that hackers took control of a booster station, but says no risk to drinking water or...

ICS/OT

Mandiant's Chief analyst urges critical infrastructure defenders to work on finding and removing traces of Volt Typhoon, a Chinese government-backed hacking team caught in...