Security Experts:

Connect with us

Hi, what are you looking for?



Registration for 2016 ICS Cyber Security Conference Now Open

Largest and Longest Running ICS Cyber Security Conference Opens Registration for 2016 Event

Largest and Longest Running ICS Cyber Security Conference Opens Registration for 2016 Event

Online registration for SecurityWeek’s 2016 Industrial Control Systems (ICS) Cyber Security Conference, to be held October 24 – 27, 2016 at the Georgia Tech Hotel and Conference Center in Atlanta, Ga., is now open.

The conference is the foremost and longest-running cyber security-focused event series for the industrial control systems sectors and caters to the energy, water, utility, chemical, transportation, manufacturing, and other industrial and critical infrastructure organizations.

ICS Cyber Security Conference Logo

With a long 14-year history, the conference has proven to bring value to attendees through the robust exchange of technical information, vulnerability research, actual incidents, insights, and best practices to help protect industrial networks from cyber attacks.

Produced by SecurityWeek, the conference addresses ICS/SCADA topics including protection for SCADA systems, plant control systems, engineering workstations, substation equipment, programmable logic controllers (PLCs), and other field control system devices.

The Conference is unique and has historically focused on control system end-users from various industries and what cyber vulnerabilities mean to control system reliability and safe operation. It also has a strong history of having discussions of actual ICS cyber incidents.

A full day of training and workshops are included, with additional options for advanced ICS cyber security training courses.

The 2016 Conference is expected to attract more than 400 professionals from around the world. Early registration discounts are currently available. 

Learn More and Register Now

An official call for papers will follow shortly.

Sponsorship Opportunities

Sponsorship and exhibitor opportunities for the 2016 ICS Cyber Security Conference are available. Please contact SecurityWeek for information.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...


The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...


Cybersecurity firm Forescout shows how various ICS vulnerabilities can be chained for an exploit that allows hackers to cause damage to a bridge.


Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.


More than 1,300 ICS vulnerabilities were discovered in 2022, including nearly 1,000 that have a high or critical severity rating.

Cybersecurity Funding

Internet of Things (IoT) and Industrial IoT security provider Shield-IoT this week announced that it has closed a $7.4 million Series A funding round,...


Siemens and Schneider Electric address nearly 100 vulnerabilities across several of their products with their February 2023 Patch Tuesday advisories.


Wago has patched critical vulnerabilities that can allow hackers to take complete control of its programmable logic controllers (PLCs).