Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cyber Insurance

Preview: 2014 ICS Cyber Security Conference – Oct. 20 – 23

ICS Cyber Security Conference Sponsors

ICS Cyber Security Conference Sponsors

Hundreds of professionals from around the world will come together on October 20-23 for the 14th edition of the ICS Cyber Security Conference, the longest-running cyber security conference dedicated to the industrial control system sector.

Over the course of four days, operations engineers and representatives of government, vendors and academia will discuss the hottest topics related to ICS security at the Georgia Tech Hotel and Conference Center in Atlanta.

Participants will have the opportunity to learn about the protection of SCADA systems, plant control systems, engineering workstations, substation equipment, programmable logic controllers (PLCs), and other field control system devices. In addition to being informed on actual ICS cyber security incidents, solutions, standards, and policy issues, attendees will be given demonstrations on securing critical systems.

On Monday, the first day of the conference, attendees can take part in workshops on basic cyber threats, building a threat intelligence program, authentication in critical infrastructure, patching the recently discovered ShellShock bug in ICS/SCADA systems, and ICS for non-ICS personnel.

2014 ICS Cyber Security Conference
Register for the 2014 ICS Cyber Security Conference!

Starting Tuesday, participants will learn not only how to identify attacks and strengthen their defenses, but they will also find out about the methods and vulnerabilities that can be leveraged by threat actors.

Joe Weiss, chairman of the ICS Cyber Security Conference, will discuss the current status of the industry, while Rick Welsh, head of cyber insurance at AEGIS London, is scheduled to detail the topic of cyber insurance for ICS.

As far as attack methods are concerned, Svetlana Cherkasova, a security researcher with Digital Security, will demonstrate how industrial control systems can be compromised through a 4-20mA current loop. Alex Tarter, technical director for cyber security at Ultra Electronics, 3eTI, will show how easy it is to hack a major brand’s distributed control systems (DCS) protocol. Alexey Polyakov, Future Technologies Security Intelligence Manager at Kaspersky Lab, will discuss why ICS organizations and AV Security vendor see ICS cyber security differently.

The event will cater to energy, chemical, manufacturing, utility, transportation, and other industrial and critical infrastructure organizations. For example, representatives of the oil and gas industry will surely be interested in the presentation of Lior Frenkel, CEO and co-founder of Waterfall Security Solutions, a company which recently teamed up with Schneider Electric to protect control system networks. Frenkel will present a case study on deploying unidirectional gateways to secure offshore platforms.

Billy Rios, who has identified numerous vulnerabilities in ICS over the past years, will discuss the security issues affecting building control systems. Representatives of the Air Force Institute of Technology (AFIT) will detail their efforts on ICS cyber security.

Advertisement. Scroll to continue reading.

Networking receptions will take place on Tuesday and Wednesday nights, and all workshops meals are included with a full conference pass.

This event sold out in 2013 and is filling up quickly. Register today to hold your spot!

2014 ICS Cyber Security Conference Sponsors

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cyber Insurance

Cyberinsurance and protection firm Boxx Insurance raises $14.4 million in a Series B funding round led by Zurich Insurance.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...