CONFERENCE On Demand: Cyber AI & Automation Summit - Watch Now
Connect with us

Hi, what are you looking for?



Critical Infrastructure Stakeholders Gather for Day 2 of SecurityWeek’s 2023 ICS Cybersecurity Conference

SecurityWeek’s 2023 ICS Cybersecurity Conference continues in Atlanta, as hundreds of industrial cybersecurity stakeholders gather for Day 2 of the annual industrial cybersecurity conference.

ICS Cybersecurity Conference

SecurityWeek’s 2023 ICS Cybersecurity Conference continues today in Atlanta, as hundreds of industrial cybersecurity stakeholders gather for Day 2 of the annual industrial cybersecurity conference. Some video content from Day 1 is available to watch on demand, and many sessions from Wednesday, October 25th, will be live streamed

Onsite attendees can join the breakfast session hosted by ThreatGEN’s Clint Bodungen, for an interactive tabletop exercise for incident response powered by generative AI, making it dynamic, engaging, and incredibly efficient.

In the first session of the day, US Marine Corps cyber analyst John Link talks about ‘A day in the life of a military security tester’, providing participants with valuable insights into the methodologies, practices, and challenges in maintaining robust cybersecurity stances across diverse operational environments. 

The second day continues with a panel where representatives from ExxonMobil, the Metropolitan St. Louis Sewer District, and Palo Alto Networks will discuss best practices for converging IT/OT security operations. 

Bradley Nash of ExxonMobil
Bradley Nash of ExxonMobil discusses the consequences of compromised external network connections on Tuesday, October 24th in Atlanta.

ICS Cybersecurity Conference attendees can also gain valuable information from Roya Gordon, executive industry consultant for OT cybersecurity at Hexagon’s Asset Lifecycle Intelligence division, on assessing the risk posed by insider threats to industrial environments.

Scott McNeil, industrial network and security architect at Global Process Automation, has a technical session on standards and best practices for securing industrial wireless infrastructure within a facility, as well as understanding what can interfere with wireless communications. 

After the lunch break, Blaine Jeffries, senior OT security engineer at MITRE, will show participants how the ‘Caldera for OT’ cybersecurity framework can be used to emulate adversary actions in operational environments. 

Gerard Vidal, the CTO of Opscura, will talk about how quantum computing could impact OT security, sharing knowledge on techniques for increasing the longevity of the cybersecurity solutions they are currently implementing.

Representatives of the Institute for Information Industry propose the idea of using the NICE framework and the digital twins concept to solve the workforce capability gap.

Advertisement. Scroll to continue reading.

Access to the virtual component of the hybrid event is available at, where you can view live and on demand sessions, along with a virtual expo hall.

Written By

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join us as we delve into the transformative potential of AI, predictive ChatGPT-like tools and automation to detect and defend against cyberattacks.


As cybersecurity breaches and incidents escalate, the cyber insurance ecosystem is undergoing rapid and transformational change.


Expert Insights

Related Content


The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...


Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.


Wago has patched critical vulnerabilities that can allow hackers to take complete control of its programmable logic controllers (PLCs).


Cybersecurity firm Forescout shows how various ICS vulnerabilities can be chained for an exploit that allows hackers to cause damage to a bridge.

Cybersecurity Funding

Internet of Things (IoT) and Industrial IoT security provider Shield-IoT this week announced that it has closed a $7.4 million Series A funding round,...


More than 1,300 ICS vulnerabilities were discovered in 2022, including nearly 1,000 that have a high or critical severity rating.