Security professionals from various industries will gather next week at the 2016 edition of SecurityWeek’s ICS Cyber Security Conference. The conference takes place on October 24-27 at the Georgia Tech Hotel & Conference Center in Atlanta, Georgia. This year’s keynote speaker is Admiral Michael S. Rogers, Director of the U.S. National Security Agency (NSA) and Commander of the U.S. Cyber Command.
The event kicks off on Monday with a series of open and advanced workshops focusing on operational technology (OT), critical infrastructure, SCADA systems, and management. Participants will have the opportunity to learn not only how an organization can be protected against attacks, but also how attackers think and operate when targeting control systems.
On Tuesday, following his keynote, Admiral Rogers will take part in a conversation and questions session. I will be providing my state-of-the state of ICS cyber security including a summary of recent ICS cyber incidents. On the same day, Yokogawa’s Jeff Melrose will detail drone attacks on industrial sites, ICS cybersecurity expert Mille Gandelsman will disclose new vulnerabilities in popular SCADA systems. In addition to an attack demo targeting a Schweitzer SEL-751A feeder protection relay, the day will feature several focused breakout sessions and a panel discussion on risk management and insurance implications.
On Wednesday, the event includes presentations on PLC vulnerabilities, attacks against air-gapped systems, cyberattack readiness exercises, and management issues. Also on Wednesday, ExxonMobil Chief Engineer Don Bartusiak will detail the company’s initiative to build a next-generation process control architecture. Breakout sessions will focus on risk management, incident response, safety and cybersecurity programs, emerging technologies, and the benefits of outside cybersecurity services in the automation industry.
On Thursday, attendees will have the opportunity to learn about the implications of the Ukrainian energy hack on the U.S. grid, practical attacks on the oil and gas industries, and how technologies designed for video game development and engineering can be used to simulate cyberattacks and evaluate their impact. Speakers will also detail the status of ICS in developing countries, the need for physical security, the implications associated with the use of cloud technologies in industrial environments, and the implementation of a publicly accessible database covering critical infrastructure incidents.
Online registration is available at www.icscybersecurityconference.com
Joe Weiss