Connect with us

Hi, what are you looking for?



Preview: SecurityWeek’s 2019 ICS Cyber Security Conference (Oct. 21-24 | Atlanta)

SecurityWeek’s 2019 ICS Cyber Security Conference, the largest and longest-running event dedicated to industrial and critical infrastructure cybersecurity, is set to take place in Atlanta, Ga. on October 21-24.

SecurityWeek’s 2019 ICS Cyber Security Conference, the largest and longest-running event dedicated to industrial and critical infrastructure cybersecurity, is set to take place in Atlanta, Ga. on October 21-24.

The conference will feature training sessions, case studies and various talks, including technical and strategy-focused presentations. The goal is to provide users, vendors and government representatives a platform for discussing threats and incidents, and to enable them to cooperate on finding solutions to modern problems faced by industrial and critical infrastructure organizations.

The 4-day conference will take place at the InterContinental Hotel in Atlanta, and will kick off on Monday, October 21, with several full day workshops and training, along with several general sessions.

Full day training options for 2019 include:

• Advanced ICS/SCADA Hacking Training

• Intro to Industrial Automation Security and ISA/IEC 62443 Standards

• ICS Red Team/Blue Team Training

Advertisement. Scroll to continue reading.

Monday will also feature sessions and short workshops on the state of OT cybersecurity, attack methods and prevention techniques, cybersecurity assessments, securing access to ICS networks with open source two-factor authentication (2FA), creating and conducting a tabletop exercise, threats from the darknet, applying DevSecOps to ICS, analyzing industrial communication protocols, smart grid resilience, and an introduction to some new concepts.

Tuesday kicks off with Derek Harp, founder and chairman of Control Systems Cyber Security Association International (CS2AI), presenting the results of a survey focusing on the current state of ICS security.

The keynote of the ICS Cyber Security Conference is in the form of a fireside chat with Admiral Mike Rogers, former director of the National Security Agency (NSA), the former chief of the Central Security Service, and the former commander of the U.S. Cyber Command. Rogers will join SecurityWeek’s Mike Lennon for a discussion on topics such as geopolitical tensions, nation-state threats, protecting critical infrastructure, and others.

Following the keynote, Joe Slowik of industrial cybersecurity firm Dragos will discuss integrity-based attacks on ICS environments and provide recommendations for defense and recovery.

Patrik Chartrand, cybersecurity specialist in SNC-Lavalin’s Rail & Transit unit, will simulate a level 0 attack on the systems present in a train and demonstrate potential impact.

A researcher from Tenable will describe a theoretical attack scenario involving recently disclosed industrial system vulnerabilities and how they can be exploited to cause disruption to power systems.

Researchers from the Oak Ridge National Laboratory will demonstrate the capabilities of a prototype system, called Deep-CYBERIA, designed to enhance the monitoring, discovery and diagnosis of level 0 sensors.

On Wednesday, October 23, Eric Byres, CEO of aDolus, will detail the security of the ICS supply chain and the priorities of various stakeholders, as identified by a study conducted by the U.S. Department of Homeland Security.

IBM’s Robert Dyson will share some advice on eliminating blind spots from an organization’s OT security program, and Dragos’ Thomas Pope will show how adversaries are increasingly relying on the same attack tools in their operations.

Representatives of organizations in the water sector will discuss the challenges and lessons learned throughout their journey to securing industrial systems.

Matthias Niedermaier, a German researcher specializing in the security of embedded systems, will show how hackers can interact with the physical side of PLCs and the potential impact of such attacks.

Other interesting talks focus on accurately assessing one’s ICS cybersecurity posture, lessons learned from testing OT security solutions in cyber ranges, securing smart sensors in industrial machines, how threat hunters can reverse engineer binaries from OT equipment, the convergence of safety and cybersecurity, and myths surrounding IIoT security.

Networking & Parties

In addition to 4 full days of content from leading experts and end users, there are several opportunities to network and have discussions with your peers off the stage.

Bourbon ISAC
The 2019 conference will debut Bourbon-ISAC, a networking event on Tuesday that will offer hand-picked selections from more than 70 American bourbons from the Southern Art Bourbon Bar. Bourbon-ISAC will offer you a chance to end the day tasting some great Bourbons and networking with conference attendees. Full dinner will be served prior.
On Wednesday, there is an exciting offsite party at South City Kitchen that you won’t want to miss. Attendees will enjoy Southern classics with a sophisticated spin from an iconic bungalow. This VIP experience for all full conference pass holders will include signature dishes like fried chicken and shrimp & grits alongside innovative, inspired regional cuisine. Enjoy craft cocktails, local beers and fantastic wines as you network with other conference attendees.
A welcome reception will also be held on Monday evening.
Register now to secure space in the advanced trainings and workshops, as seats are limited and selling quickly.

The complete agenda for the event is available on the ICS Cyber Security Conference website. SecurityWeek also provides a “justify your attendance” template for individuals who need to convince their employers that attending the conference will be beneficial to the organization.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...


The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...


Wago has patched critical vulnerabilities that can allow hackers to take complete control of its programmable logic controllers (PLCs).


Cybersecurity firm Forescout shows how various ICS vulnerabilities can be chained for an exploit that allows hackers to cause damage to a bridge.


More than 1,300 ICS vulnerabilities were discovered in 2022, including nearly 1,000 that have a high or critical severity rating.


Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.

Cybersecurity Funding

Internet of Things (IoT) and Industrial IoT security provider Shield-IoT this week announced that it has closed a $7.4 million Series A funding round,...


Siemens and Schneider Electric address nearly 100 vulnerabilities across several of their products with their February 2023 Patch Tuesday advisories.