Security Experts:

Connect with us

Hi, what are you looking for?



Registration for 2016 ICS Cyber Security Conference Now Open

Largest and Longest Running ICS Cyber Security Conference Opens Registration for 2016 Event

Largest and Longest Running ICS Cyber Security Conference Opens Registration for 2016 Event

Online registration for SecurityWeek’s 2016 Industrial Control Systems (ICS) Cyber Security Conference, to be held October 24 – 27, 2016 at the Georgia Tech Hotel and Conference Center in Atlanta, Ga., is now open.

The conference is the foremost and longest-running cyber security-focused event series for the industrial control systems sectors and caters to the energy, water, utility, chemical, transportation, manufacturing, and other industrial and critical infrastructure organizations.

ICS Cyber Security Conference Logo

With a long 14-year history, the conference has proven to bring value to attendees through the robust exchange of technical information, vulnerability research, actual incidents, insights, and best practices to help protect industrial networks from cyber attacks.

Produced by SecurityWeek, the conference addresses ICS/SCADA topics including protection for SCADA systems, plant control systems, engineering workstations, substation equipment, programmable logic controllers (PLCs), and other field control system devices.

The Conference is unique and has historically focused on control system end-users from various industries and what cyber vulnerabilities mean to control system reliability and safe operation. It also has a strong history of having discussions of actual ICS cyber incidents.

A full day of training and workshops are included, with additional options for advanced ICS cyber security training courses.

The 2016 Conference is expected to attract more than 400 professionals from around the world. Early registration discounts are currently available. 

Learn More and Register Now

An official call for papers will follow shortly.

Sponsorship Opportunities

Sponsorship and exhibitor opportunities for the 2016 ICS Cyber Security Conference are available. Please contact SecurityWeek for information.

Written By

Click to comment

Expert Insights

Related Content

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...


Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.


Vulnerabilities in GE’s Proficy Historian product could be exploited for espionage and to cause damage and disruption in industrial environments.


A hacktivist group has made bold claims regarding an attack on an ICS device, but industry professionals have questioned their claims.

Cybersecurity Funding

Internet of Things (IoT) and Industrial IoT security provider Shield-IoT this week announced that it has closed a $7.4 million Series A funding round,...


Vulnerabilities in industrial routers made by InHand Networks could allow hackers to bypass security systems and gain access to OT networks.


Organizations using controllers made by Rockwell Automation have been informed recently about several potentially serious vulnerabilities.


Researchers have demonstrated that threat actors could obtain global private keys that protect some of Siemens’ industrial devices, and the vendor says it cannot...