Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Last Call: CFP for ICS Cybersecurity Conference Closes July 15th

2022 ICS Cybersecurity Conference

2022 ICS Cybersecurity Conference

The call for presentations (CFP) for SecurityWeek’s 2022 ICS Cyber Security Conference closes on July 15, 2022.

Celebrating its 21st year, the 2022 conference will feature 3-day full days of conference sessions and 1 full-day of optional trainings and workshops that will dive deep into the world of industrial cybersecurity and help those charged with protecting operational technology (OT) environments defend against cyber threats. The CFP is open through Friday, July 15th, so be sure to submit your speaking proposal soon.

Don’t forget to register by July 31st to get the super early bird rate of just $1795 (save $500).

Submit for CFP | Register for Conference

New for 2022

New industry-focused breakout tracks throughout the week, allowing you to have a mini-binge on sessions relevant to your industry and network with others in similar roles

New Mobile App – A new mobile app will enhance the attendee experience, allowing you to maintain your personalized agenda, book meetings and network with others.

More Hands-On Experiences – In addition to a CTF, we’ll have more hands-on exhibits and live demos than ever

Advertisement. Scroll to continue reading.

More Training Options – More advanced training opportunities than ever before, including both technical and strategic planning courses 

2022 Sponsors

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

ICS/OT

Wago has patched critical vulnerabilities that can allow hackers to take complete control of its programmable logic controllers (PLCs).

Cybercrime

Energy giants Schneider Electric and Siemens Energy confirm being targeted by the Cl0p ransomware group in the campaign exploiting a MOVEit zero-day.

ICS/OT

Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.

ICS/OT

Municipal Water Authority of Aliquippa in Pennsylvania confirms that hackers took control of a booster station, but says no risk to drinking water or...

ICS/OT

Mandiant's Chief analyst urges critical infrastructure defenders to work on finding and removing traces of Volt Typhoon, a Chinese government-backed hacking team caught in...