Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Preview: SecurityWeek’s 2019 ICS Cyber Security Conference (Oct. 21-24 | Atlanta)

SecurityWeek’s 2019 ICS Cyber Security Conference, the largest and longest-running event dedicated to industrial and critical infrastructure cybersecurity, is set to take place in Atlanta, Ga. on October 21-24.

SecurityWeek’s 2019 ICS Cyber Security Conference, the largest and longest-running event dedicated to industrial and critical infrastructure cybersecurity, is set to take place in Atlanta, Ga. on October 21-24.

The conference will feature training sessions, case studies and various talks, including technical and strategy-focused presentations. The goal is to provide users, vendors and government representatives a platform for discussing threats and incidents, and to enable them to cooperate on finding solutions to modern problems faced by industrial and critical infrastructure organizations.

The 4-day conference will take place at the InterContinental Hotel in Atlanta, and will kick off on Monday, October 21, with several full day workshops and training, along with several general sessions.

Full day training options for 2019 include:

• Advanced ICS/SCADA Hacking Training

• Intro to Industrial Automation Security and ISA/IEC 62443 Standards

• ICS Red Team/Blue Team Training

Monday will also feature sessions and short workshops on the state of OT cybersecurity, attack methods and prevention techniques, cybersecurity assessments, securing access to ICS networks with open source two-factor authentication (2FA), creating and conducting a tabletop exercise, threats from the darknet, applying DevSecOps to ICS, analyzing industrial communication protocols, smart grid resilience, and an introduction to some new concepts.

Advertisement. Scroll to continue reading.

Tuesday kicks off with Derek Harp, founder and chairman of Control Systems Cyber Security Association International (CS2AI), presenting the results of a survey focusing on the current state of ICS security.

The keynote of the ICS Cyber Security Conference is in the form of a fireside chat with Admiral Mike Rogers, former director of the National Security Agency (NSA), the former chief of the Central Security Service, and the former commander of the U.S. Cyber Command. Rogers will join SecurityWeek’s Mike Lennon for a discussion on topics such as geopolitical tensions, nation-state threats, protecting critical infrastructure, and others.

Following the keynote, Joe Slowik of industrial cybersecurity firm Dragos will discuss integrity-based attacks on ICS environments and provide recommendations for defense and recovery.

Patrik Chartrand, cybersecurity specialist in SNC-Lavalin’s Rail & Transit unit, will simulate a level 0 attack on the systems present in a train and demonstrate potential impact.

A researcher from Tenable will describe a theoretical attack scenario involving recently disclosed industrial system vulnerabilities and how they can be exploited to cause disruption to power systems.

Researchers from the Oak Ridge National Laboratory will demonstrate the capabilities of a prototype system, called Deep-CYBERIA, designed to enhance the monitoring, discovery and diagnosis of level 0 sensors.

On Wednesday, October 23, Eric Byres, CEO of aDolus, will detail the security of the ICS supply chain and the priorities of various stakeholders, as identified by a study conducted by the U.S. Department of Homeland Security.

IBM’s Robert Dyson will share some advice on eliminating blind spots from an organization’s OT security program, and Dragos’ Thomas Pope will show how adversaries are increasingly relying on the same attack tools in their operations.

Representatives of organizations in the water sector will discuss the challenges and lessons learned throughout their journey to securing industrial systems.

Matthias Niedermaier, a German researcher specializing in the security of embedded systems, will show how hackers can interact with the physical side of PLCs and the potential impact of such attacks.

Other interesting talks focus on accurately assessing one’s ICS cybersecurity posture, lessons learned from testing OT security solutions in cyber ranges, securing smart sensors in industrial machines, how threat hunters can reverse engineer binaries from OT equipment, the convergence of safety and cybersecurity, and myths surrounding IIoT security.

Networking & Parties

In addition to 4 full days of content from leading experts and end users, there are several opportunities to network and have discussions with your peers off the stage.

Bourbon ISAC
The 2019 conference will debut Bourbon-ISAC, a networking event on Tuesday that will offer hand-picked selections from more than 70 American bourbons from the Southern Art Bourbon Bar. Bourbon-ISAC will offer you a chance to end the day tasting some great Bourbons and networking with conference attendees. Full dinner will be served prior.
On Wednesday, there is an exciting offsite party at South City Kitchen that you won’t want to miss. Attendees will enjoy Southern classics with a sophisticated spin from an iconic bungalow. This VIP experience for all full conference pass holders will include signature dishes like fried chicken and shrimp & grits alongside innovative, inspired regional cuisine. Enjoy craft cocktails, local beers and fantastic wines as you network with other conference attendees.
A welcome reception will also be held on Monday evening.
Register now to secure space in the advanced trainings and workshops, as seats are limited and selling quickly.

The complete agenda for the event is available on the ICS Cyber Security Conference website. SecurityWeek also provides a “justify your attendance” template for individuals who need to convince their employers that attending the conference will be beneficial to the organization.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

ICS/OT

Municipal Water Authority of Aliquippa in Pennsylvania confirms that hackers took control of a booster station, but says no risk to drinking water or...

ICS/OT

Mandiant's Chief analyst urges critical infrastructure defenders to work on finding and removing traces of Volt Typhoon, a Chinese government-backed hacking team caught in...

Cybercrime

Energy giants Schneider Electric and Siemens Energy confirm being targeted by the Cl0p ransomware group in the campaign exploiting a MOVEit zero-day.

ICS/OT

Wago has patched critical vulnerabilities that can allow hackers to take complete control of its programmable logic controllers (PLCs).

ICS/OT

As smart cities evolve with more and more integrated connected services, cybersecurity concerns will increase dramatically.