Security Experts:

Connect with us

Hi, what are you looking for?


Security Architecture

How Much Harm Could a Moderately Skilled Hacker Cause to Critical Nuclear Systems?

At Suits and Spooks New York (June 20-21), Joe Weiss will explain how easy it is to sabotage a nuclear facility through the power station that provides service.

At Suits and Spooks New York (June 20-21), Joe Weiss will explain how easy it is to sabotage a nuclear facility through the power station that provides service.

Joe Weiss of Applied Control Solutions, John Mallery of MIT, and Jeffrey Carr of Taia Global, will hold a panel discussion at Suits and Spooks New York on where the tipping point lies for a cyber attack to turn into a catastrophe.

Suits and Spooks

Weiss, an internationally known expert on vulnerabilities found in industrial control systems (ICS), will present on how any hacker with only a “101” level of ICS knowledge, could take control of any number of critical nuclear systems, both land and sea-based, if they’re connected to PG&E or any other electric power provider due to systemic weaknesses found in all industrial control systems.

John Mallery of MIT will speak to lower level attacks which might be used between nation states to signal their intentions, while Jeffrey Carr will moderate the discussion and invite debate from the attendees.

Also at Suits and Spooks NY, Scott Donnelly (RecordedFuture) will speak about how social media could be used as C2 for cyber operations during a kinetic conflict, Evan Kohlmann will brief attendees on current trends in online terrorist financing. Other speakers will assess threats against the financial system, novel approaches to public-private partnerships to defend against threats, and how combat TTPs are starting to inform commercial cyber security operations.

Reserve your seat at this unique event and participate in the discussions by registering today.

For Suits and Suits Sponsorship opportunities please contact SecurityWeek.

RelatedSecurityWeek Acquires Suits and Spooks Security Events

Written By

Click to comment

Expert Insights

Related Content


Out of the 335 public recommendations on a comprehensive cybersecurity strategy made since 2010, 190 were not implemented by federal agencies as of December...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Big-game malware hunters at Volexity are shining the spotlight on a sophisticated Chinese APT caught recently exploiting a Sophos firewall zero-day to plant backdoors...

Incident Response

Implementation of security automation can be overwhelming, and has remained a barrier to adoption

Application Security

Password management software firm LastPass has suffered a data breach that led to the theft of source code and proprietary technical information.

Endpoint Security

Apple has launched a new security research blog and website, which will also be the new home of the company’s bug bounty program.


The White House announced on Wednesday that the Industrial Control Systems (ICS) Cybersecurity Initiative has been expanded to include the chemical sector.