This event has ended. Visit the
official site
or
create your own event on Sched
.
2018 ICS Cyber Security Conference
-
Saved To
My Schedule
Welcome to the Interactive Agenda for SecurityWeek’s
2018 ICS Cyber Security Conference!
(View the full conference website
here
) (You can
Register for ICS Cyber Security Conference Here
)
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Search
or browse by date + venue
Breakout - Strategy Track
All
Panel
Breakout - Tech Track
Breaks
Extended Workshop
Main Track
All
Panel
Solutions Theater
Sign up
or
log in
to bookmark your favorites and sync them to your phone or calendar.
menu
Menu
Schedule
Speakers
Search
tune
Filter sessions
Simple
Expanded
Grid
By Venue
Monday
, October 22
7:30am EDT
Breakfast and Registration
Pre-function Hallway
9:00am EDT
Developing an Effective ICS Risk Assessment Methodology
Windsor DE
Harry Regan
Protecting ICS With Decentralization + Blockchain
Windsor C
Susanto Irwan
Red Team/Blue Team Industrial Cyber Security Training (Full Day - Registration Required)
Hope 2 & 3
Clint Bodungen
9:45am EDT
Top-Down or Bottom’s Up: Comparing ICS Cybersecurity Risk Assessment Methodologies
Windsor DE
John Cusimano
Safety First: Active Scanning for ICS Devices
Windsor C
Matt Everson
10:30am EDT
Morning Break
Pre-function Hallway
11:00am EDT
Creating an ICS Cyber Security Assurance Program
Windsor DE
Justin Christensen
Embracing Compromise: Enhancing ICS Security With The Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) Framework
Windsor C
Lane Thames
Hands-on Workshop: Protecting ICS and SCADA Networks (1/2 Day)
Solutions Theater
11:45am EDT
OT and IT Integration: A Hacker's Perspective
Windsor DE
Harry Regan
12:30pm EDT
Lunch - Windsor Garden
Windsor Garden
1:30pm EDT
Assessing the Security and Reliability of ICS
Jack D. Oden
How NOT to Patch Critical Systems
Roger Rademacher
2:15pm EDT
Defense Strategies for the Robotics Ecosystem
TBA
Robert Lupo
Deploying a Local Certificate Authority to Secure Industrial Control Applications
Josh Carlson
3:00pm EDT
Afternoon Break
Pre-function Hallway
3:30pm EDT
Increase in CVE Reports vs Long Field-Deployment - How to Manage the Conflict
Windsor DE
Ilan Barda
Zero Trust Networking for ICS Environments
Windsor C
Wayne Dixon
4:15pm EDT
Ghost in the Control Room: How Attackers Use Physical Access Controls Against You
Windsor DE
Valerie Thomas
Introducing the ICS Cyber Range – Case Study
Windsor C
Edy Almer
Tuesday
, October 23
7:30am EDT
Breakfast and Registration
Pre-function Hallway
8:00am EDT
Welcome to SecurityWeek's 2018 ICS Cyber Security Conference | USA
Grand Ballroom
Mike Lennon
8:15am EDT
ICS Manufacturer's Panel – Industrial Cybersecurity Notes from The Field
Grand Ballroom
Josh Carlson • Frank Garrabrant • Umair Masud • Patrick McBride
9:00am EDT
Defending Against Supply Chain Attacks
Grand Ballroom
Ellen Laderman
9:45am EDT
Hunting for Xenotime, Creators of TRITON/TRISIS ICS Malware
Grand Ballroom
Robert M. Lee • Marc Seitz
10:30am EDT
Morning Break
Pre-function Hallway
11:00am EDT
Approaching Cybersecurity Vendor Selection in OT Environments
Grand Ballroom
Larry O’Brien
Case Study – Mapping and Protecting Application Flows in a G&T Utility
Solutions Theatre
Michael Meason
11:45am EDT
Network Resiliency in ICS: End User Perspective
Grand Ballroom
Ben Stirling
12:30pm EDT
Lunch - Windsor Garden
Windsor Garden
1:30pm EDT
Critical Industrial Network Monitoring, an Example From the Field: Gas Distribution
Windsor DE
Bob Foley
Notes from the Field: Using Visibility and Advanced Anomaly Detection to Secure OT Environments
Windsor C
Patrick McBride
Solutions Theater: Securicon - Next Generation CyberSecurity for OT Networks
Solutions Theater
2:15pm EDT
Clear & Present Danger – Addressing Insider Threats in OT Environments
Windsor DE
Barak Perelman
Trust No One: Securing 3rd Party Connections to Industrial Control Systems
Windsor C
Mark Toussaint
Solutions Theater Darktrace: AI Cyber Defense for OT Environments
Solutions Theatre
3:00pm EDT
Afternoon Break
Pre-function Hallway
3:30pm EDT
[Panel] The Road to Building and Delivering a Workable IT/OT Program
Windsor DE
Ramsey Hajj • Mandy Huth • Robert M. Lee • Sean Peasley
Side Channel Attacks Against ICS Devices
Windsor C
Demos Andreou
Solutions Theater: Skybox Security - See and Understand: Where are Critical Systems Most Vulnerable?
Solutions Theater
4:15pm EDT
Securing IIoT Containers, Communications and Storage with TPM 2.0
Windsor C
Joe Doetzl • Dean Weber
5:00pm EDT
Cocktail Reception - Foyer & Exhibitor Hall (5-7PM)
Pre-function Hallway
7:00pm EDT
Nozomi Networks Bourbon Bash Birthday!
Pre-function Hallway
Wednesday
, October 24
7:30am EDT
Breakfast and Registration
Pre-function Hallway
8:15am EDT
Cyber Vulnerability Investigations: How The UK Ministry of Defence Protects Critical Infrastructure
Grand Ballroom
Robert Longbottom
9:00am EDT
Fireside Chat: Cisco's Edna Conway Talks Supply Chain Security With Microsoft Cybersecurity Field CTO Diana Kelley
Grand Ballroom
Edna Conway • Diana Kelley
9:45am EDT
What is Consequence-Driven Risk Management? Why Should You Do It, and How.
Grand Ballroom
Clint Bodungen
10:30am EDT
Morning Break
Pre-function Hallway
11:00am EDT
An Approach to Making Manufacturing Security a Success
Grand Ballroom
Kristin Demoranville • Stuart King
Solutions Theater Darktrace: AI Cyber Defense for OT Environments
Solutions Theatre
11:45am EDT
TRITON Live: Reverse Engineering the Attack & Free Tools to Protect Against Safety System Attacks
Grand Ballroom
Dr. Andrea Carcano
12:30pm EDT
Lunch - Windsor Garden
Windsor Garden
12:45pm EDT
Lunch Workshop - Seeing is Believing; A Deep Dive Into the Latest Innovations in Industrial Cybersecurity
TBA
1:30pm EDT
Lessons Learned by Deploying Honeypots to Catch ICS Attacks
Windsor DE
Sebastien Tricaud
Inside the Mind of a Hacker / Security of Digital Twins
Windsor C
Dave Belt • Mark Hearn
2:15pm EDT
Prioritizing Solutions: Balancing Protective, Detective and Corrective Controls in ICS Environments
Windsor DE
Ed Turkaly
IIC Endpoint Security Best Practices
Windsor C
Dean Weber
Solutions Theater: Skybox Security - See and Understand: Where are Critical Systems Most Vulnerable?
Solutions Theater
3:00pm EDT
Afternoon Break
Pre-function Hallway
3:30pm EDT
Lessons Learned: Implementation of Cyber Security Programs at Nuclear Plants
Windsor DE
Michael Brown
Industrial IOT Cross-Layer Forensics for WirelessHART
Solutions Theater: Securicon - Next Generation CyberSecurity for OT Networks
Solutions Theatre
4:15pm EDT
Demystifying ICS Cyber Risk
Windsor DE
Mike Radigan
Assessing Device-based Risk to Secure ICS Environments
Solutions Theatre
Dr. Srinivas Mukkamala
Finding the Weakest Link in Your ICS Network Using Exploit Path Analysis (EPA)
Windsor C
Dr. Nick Duan
6:00pm EDT
Offsite Party - South City Kitchen
Thursday
, October 25
7:30am EDT
Breakfast and Registration
Pre-function Hallway
8:15am EDT
Leadership, Security, and Support at the Clinton White House
Grand Ballroom
Colonel Mark Gelhardt – Former CIO for President Clinton
9:00am EDT
Making Sense of Machine Learning Analytics for Situational Awareness & Threat Monitoring in ICS
Grand Ballroom
Clint Bodungen
Solutions Theater: Securicon - Next Generation CyberSecurity for OT Networks
Solutions Theatre
9:45am EDT
ICS Security Researchers & Automation Vendors: Building Mutual Trust
Grand Ballroom
Phil Neray • Neil Peterson
Solutions Theater: Skybox Security
Solutions Theatre
10:30am EDT
Morning Break
Pre-function Hallway
11:00am EDT
Analysis of Russian Cyber Activity Against U.S. Critical Infrastructure
Grand Ballroom
Jonathan Briney
Rethinking Our Approach to Protecting Vulnerable Brownfield Devices
Grand Ballroom
Keao Caindec • Bill Cotter • Dean Weber
Solutions Theater Darktrace: AI Cyber Defense for OT Environments
Solutions Theater
11:45am EDT
Tamper-Proof Rootkit Detection for ICS Through Power Consumption Analysis
Grand Ballroom
Joel Dawson • Stacy Prowell
12:30pm EDT
Lunch - Windsor Garden
Windsor Garden
1:30pm EDT
Learning from Mistakes of Others and Achieving the Biggest, Immediate Reduction in Risk
Windsor DE
Edgard Capdevielle • Robert Dyson
Visibility to Protective Controls
Windsor C
Gary DiFazio
2:15pm EDT
Reducing Industrial Risk in a Converging IT/OT World
Windsor DE
Jason Haward-Grau
Digital Twin Framework for Power Grid Cyber Resilience
Windsor C
Juan Lopez Jr.
3:00pm EDT
Afternoon Break
3:15pm EDT
IT Malware Threats to OT systems – Case Study of Cryptojacking and Related Exploits to ICS
Windsor DE
TJ Roe
4:00pm EDT
Open Mic Discussions & Closing Remarks
Grand Ballroom
5:00pm EDT
Conclusion of SecurityWeek's 2018 Cyber Security Conference
Grand Ballroom
Timezone
2018 ICS Cyber Security Conference
America/New York
Filter By Date
2018 ICS Cyber Security Conference
Oct 22
-
25, 2018
Monday
, October 22
Tuesday
, October 23
Wednesday
, October 24
Thursday
, October 25
Filter By Venue
Atlanta, GA, USA
Sort schedule by Venue
Grand Ballroom
Hope 2 & 3
Pre-function Hallway
Solutions Theater
Solutions Theatre
TBA
Windsor Garden
Windsor C
Windsor DE
Filter By Type
Breakout - Strategy Track
All
Panel
Breakout - Tech Track
Breaks
Extended Workshop
Main Track
All
Panel
Solutions Theater
Filter sessions
Apply filters to sessions.
close
Dates
Monday
, October 22
Tuesday
, October 23
Wednesday
, October 24
Thursday
, October 25
Venue
Grand Ballroom
Hope 2 & 3
Pre-function Hallway
Solutions Theater
Solutions Theatre
TBA
Windsor Garden
Windsor C
Windsor DE
Session Type
Breakout - Strategy Track
All
Panel
Breakout - Tech Track
Breaks
Extended Workshop
Main Track
All
Panel
Solutions Theater
Other Filters