Security Experts:

Connect with us

Hi, what are you looking for?



Agenda: 2015 ICS Cyber Security Conference [Oct. 26-29]

Final Agenda Posted for 2015 ICS Cyber Security Conference

Final Agenda Posted for 2015 ICS Cyber Security Conference

SecurityWeek’s 2015 Industrial Control Systems (ICS) Cyber Security Conference Takes Place October 26 – 29th at the Georgia Tech Hotel and Conference Center in Atlanta. Now in its 13th year, SecurityWeek’s ICS Cyber Security Conference is the foremost and longest-running cyber security-focused event series for the industrial control systems sectors. The conference caters to the energy, water, utility, chemical, transportation, manufacturing, and other industrial and critical infrastructure organizations.

More than 250 attendees and 20 sponsoring companies are expected gather at the longest-running event on the subject.

SecurityWeek is proud to announce that Philip D. Quade, Chief of the NSA Cyber Task Force and Special Assistant to the Director National Security Agency for Cyber, will deliver a keynote address at the conference on Oct. 27.

 The full agenda is embedded below, and can also be viewed on our dedicated agenda microsite. A FULL DAY of training and workshops is included with the full conference pass, which is $1895 for industry and $1695 for government employees. Registration, based on avaialbility, can be done online until 11:59PM on Friday, Oct. 23.

View the 2015 ICS Cyber Security Conference schedule & directory.

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...


Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.


The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...


Serious vulnerabilities found in Econolite EOS traffic controller software can be exploited to control traffic lights, but the flaws remain unpatched.

Cybersecurity Funding

Internet of Things (IoT) and Industrial IoT security provider Shield-IoT this week announced that it has closed a $7.4 million Series A funding round,...


Vulnerabilities in GE’s Proficy Historian product could be exploited for espionage and to cause damage and disruption in industrial environments.


A hacktivist group has made bold claims regarding an attack on an ICS device, but industry professionals have questioned their claims.


Vulnerabilities in industrial routers made by InHand Networks could allow hackers to bypass security systems and gain access to OT networks.