This event has ended. Visit the
official site
or
create your own event on Sched
.
2018 ICS Cyber Security Conference
-
Saved To
My Schedule
Welcome to the Interactive Agenda for SecurityWeek’s
2018 ICS Cyber Security Conference!
(View the full conference website
here
) (You can
Register for ICS Cyber Security Conference Here
)
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Search
or browse by date + venue
Breakout - Strategy Track
All
Panel
Breakout - Tech Track
Breaks
Extended Workshop
Main Track
All
Panel
Solutions Theater
Sign up
or
log in
to bookmark your favorites and sync them to your phone or calendar.
menu
Menu
Schedule
Speakers
Search
tune
Filter sessions
Simple
Expanded
Grid
By Venue
Monday
, October 22
Hope 2 & 3
9:00am •
Red Team/Blue Team Industrial Cyber Security Training (Full Day - Registration Required)
Pre-function Hallway
7:30am •
Breakfast and Registration
10:30am •
Morning Break
3:00pm •
Afternoon Break
Solutions Theater
11:00am •
Hands-on Workshop: Protecting ICS and SCADA Networks (1/2 Day)
TBA
2:15pm •
Defense Strategies for the Robotics Ecosystem
Windsor Garden
12:30pm •
Lunch - Windsor Garden
Windsor C
9:00am •
Protecting ICS With Decentralization + Blockchain
9:45am •
Safety First: Active Scanning for ICS Devices
11:00am •
Embracing Compromise: Enhancing ICS Security With The Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) Framework
3:30pm •
Zero Trust Networking for ICS Environments
4:15pm •
Introducing the ICS Cyber Range – Case Study
Windsor DE
9:00am •
Developing an Effective ICS Risk Assessment Methodology
9:45am •
Top-Down or Bottom’s Up: Comparing ICS Cybersecurity Risk Assessment Methodologies
11:00am •
Creating an ICS Cyber Security Assurance Program
11:45am •
OT and IT Integration: A Hacker's Perspective
3:30pm •
Increase in CVE Reports vs Long Field-Deployment - How to Manage the Conflict
4:15pm •
Ghost in the Control Room: How Attackers Use Physical Access Controls Against You
Tuesday
, October 23
Grand Ballroom
8:00am •
Welcome to SecurityWeek's 2018 ICS Cyber Security Conference | USA
8:15am •
ICS Manufacturer's Panel – Industrial Cybersecurity Notes from The Field
9:00am •
Defending Against Supply Chain Attacks
9:45am •
Hunting for Xenotime, Creators of TRITON/TRISIS ICS Malware
11:00am •
Approaching Cybersecurity Vendor Selection in OT Environments
11:45am •
Network Resiliency in ICS: End User Perspective
Pre-function Hallway
7:30am •
Breakfast and Registration
10:30am •
Morning Break
3:00pm •
Afternoon Break
5:00pm •
Cocktail Reception - Foyer & Exhibitor Hall (5-7PM)
7:00pm •
Nozomi Networks Bourbon Bash Birthday!
Solutions Theater
1:30pm •
Solutions Theater: Securicon - Next Generation CyberSecurity for OT Networks
3:30pm •
Solutions Theater: Skybox Security - See and Understand: Where are Critical Systems Most Vulnerable?
Solutions Theatre
11:00am •
Case Study – Mapping and Protecting Application Flows in a G&T Utility
2:15pm •
Solutions Theater Darktrace: AI Cyber Defense for OT Environments
Windsor Garden
12:30pm •
Lunch - Windsor Garden
Windsor C
1:30pm •
Notes from the Field: Using Visibility and Advanced Anomaly Detection to Secure OT Environments
2:15pm •
Trust No One: Securing 3rd Party Connections to Industrial Control Systems
3:30pm •
Side Channel Attacks Against ICS Devices
4:15pm •
Securing IIoT Containers, Communications and Storage with TPM 2.0
Windsor DE
1:30pm •
Critical Industrial Network Monitoring, an Example From the Field: Gas Distribution
2:15pm •
Clear & Present Danger – Addressing Insider Threats in OT Environments
3:30pm •
[Panel] The Road to Building and Delivering a Workable IT/OT Program
Wednesday
, October 24
Grand Ballroom
8:15am •
Cyber Vulnerability Investigations: How The UK Ministry of Defence Protects Critical Infrastructure
9:00am •
Fireside Chat: Cisco's Edna Conway Talks Supply Chain Security With Microsoft Cybersecurity Field CTO Diana Kelley
9:45am •
What is Consequence-Driven Risk Management? Why Should You Do It, and How.
11:00am •
An Approach to Making Manufacturing Security a Success
11:45am •
TRITON Live: Reverse Engineering the Attack & Free Tools to Protect Against Safety System Attacks
Pre-function Hallway
7:30am •
Breakfast and Registration
10:30am •
Morning Break
3:00pm •
Afternoon Break
Solutions Theater
2:15pm •
Solutions Theater: Skybox Security - See and Understand: Where are Critical Systems Most Vulnerable?
Solutions Theatre
11:00am •
Solutions Theater Darktrace: AI Cyber Defense for OT Environments
3:30pm •
Solutions Theater: Securicon - Next Generation CyberSecurity for OT Networks
4:15pm •
Assessing Device-based Risk to Secure ICS Environments
TBA
12:45pm •
Lunch Workshop - Seeing is Believing; A Deep Dive Into the Latest Innovations in Industrial Cybersecurity
Windsor Garden
12:30pm •
Lunch - Windsor Garden
Windsor C
1:30pm •
Inside the Mind of a Hacker / Security of Digital Twins
2:15pm •
IIC Endpoint Security Best Practices
4:15pm •
Finding the Weakest Link in Your ICS Network Using Exploit Path Analysis (EPA)
Windsor DE
1:30pm •
Lessons Learned by Deploying Honeypots to Catch ICS Attacks
2:15pm •
Prioritizing Solutions: Balancing Protective, Detective and Corrective Controls in ICS Environments
3:30pm •
Lessons Learned: Implementation of Cyber Security Programs at Nuclear Plants
4:15pm •
Demystifying ICS Cyber Risk
Thursday
, October 25
Grand Ballroom
8:15am •
Leadership, Security, and Support at the Clinton White House
9:00am •
Making Sense of Machine Learning Analytics for Situational Awareness & Threat Monitoring in ICS
9:45am •
ICS Security Researchers & Automation Vendors: Building Mutual Trust
11:00am •
Rethinking Our Approach to Protecting Vulnerable Brownfield Devices
11:00am •
Analysis of Russian Cyber Activity Against U.S. Critical Infrastructure
11:45am •
Tamper-Proof Rootkit Detection for ICS Through Power Consumption Analysis
4:00pm •
Open Mic Discussions & Closing Remarks
5:00pm •
Conclusion of SecurityWeek's 2018 Cyber Security Conference
Pre-function Hallway
7:30am •
Breakfast and Registration
10:30am •
Morning Break
Solutions Theater
11:00am •
Solutions Theater Darktrace: AI Cyber Defense for OT Environments
Solutions Theatre
9:00am •
Solutions Theater: Securicon - Next Generation CyberSecurity for OT Networks
9:45am •
Solutions Theater: Skybox Security
Windsor Garden
12:30pm •
Lunch - Windsor Garden
Windsor C
1:30pm •
Visibility to Protective Controls
2:15pm •
Digital Twin Framework for Power Grid Cyber Resilience
Windsor DE
1:30pm •
Learning from Mistakes of Others and Achieving the Biggest, Immediate Reduction in Risk
2:15pm •
Reducing Industrial Risk in a Converging IT/OT World
3:15pm •
IT Malware Threats to OT systems – Case Study of Cryptojacking and Related Exploits to ICS
Timezone
2018 ICS Cyber Security Conference
America/New York
Filter By Date
2018 ICS Cyber Security Conference
Oct 22
-
25, 2018
Monday
, October 22
Tuesday
, October 23
Wednesday
, October 24
Thursday
, October 25
Filter By Venue
Atlanta, GA, USA
Sort schedule by Venue
Grand Ballroom
Hope 2 & 3
Pre-function Hallway
Solutions Theater
Solutions Theatre
TBA
Windsor Garden
Windsor C
Windsor DE
Filter By Type
Breakout - Strategy Track
All
Panel
Breakout - Tech Track
Breaks
Extended Workshop
Main Track
All
Panel
Solutions Theater
Filter sessions
Apply filters to sessions.
close
Dates
Monday
, October 22
Tuesday
, October 23
Wednesday
, October 24
Thursday
, October 25
Venue
Grand Ballroom
Hope 2 & 3
Pre-function Hallway
Solutions Theater
Solutions Theatre
TBA
Windsor Garden
Windsor C
Windsor DE
Session Type
Breakout - Strategy Track
All
Panel
Breakout - Tech Track
Breaks
Extended Workshop
Main Track
All
Panel
Solutions Theater
Other Filters