Industrial Control Systems
SecurityWeek Extends ICS Cyber Security Conference Call for Presentations to August 31, 2020
August 12, 2020 Added by:InfosecIsland News
The official Call for Presentations (speakers) for SecurityWeek’s 2020 Industrial Control Systems (ICS) Cyber Security Conference, being held October 19 – 22, 2020 in SecurityWeek’s Virtual Conference Center, has been extended to August 31st.
Comments (0)
Preview: SecurityWeek's 2018 ICS Cyber Security Conference (Oct. 22-25)
October 09, 2018 Added by:Eduard Kovacs
Hundreds of professionals from around the world will meet in Atlanta, Ga., on October 22-25, for SecurityWeek's 2018 ICS Cyber Security Conference, the largest and longest-running conference dedicated to industrial and critical infrastructure cybersecurity.
Comments (0)
Preview: SecurityWeek's 2016 ICS/SCADA Cyber Security Conference – Oct. 24-27
October 18, 2016 Added by:Eduard Kovacs
Security professionals from various industries will gather next week at the 2016 edition of SecurityWeek’s ICS Cyber Security Conference, the longest-running event of its kind. The conference takes place on October 24-27 at the Georgia Tech Hotel & Conference Center in Atlanta, Georgia.
Comments (0)
Demonstration of Hacking a Protective Relay and Taking Control of a Motor
September 15, 2016 Added by:Joe Weiss
At the 2016 ICS Cyber Security Conference we will be providing a demonstration and will take the SEL-751A used in a traditional motor control setting and compromise not only the SEL751A, but then take control of the motor.
Comments (0)
Ukranian Electric Grid Cyber Attack – It Can it Happen Here Too
January 09, 2016 Added by:Joe Weiss
As the NERC CIP process is public, our enemies are aware of the gaping cyber holes in our electric systems. When will the responsible entities wake up or will it be after they can’t turn their lights on?
Comments (0)
BlackEnergy Malware Used in Ukraine Power Grid Attacks: Report
January 05, 2016 Added by:Eduard Kovacs
Security firm ESET has been monitoring attacks involving the threat and recently discovered that the Trojan had been used to target news media and electrical power companies in Ukraine.
Comments (0)
US Critical Infrastructures are Being Targeted by Actors in the Middle East – But Attribution is Difficult
November 19, 2015 Added by:Joe Weiss
The availability of ICS cyber exploits, and the lack of attribution, there should be more concern about the very viable cyber threat to our critical infrastructures.
Comments (0)
Observations From the 2015 ICS Cyber Security Conference
November 10, 2015 Added by:Joe Weiss
2015 ICS Cyber Security Conference – Neither the Grid, Nuclear Plants, or other Undustries are Cyber Secure
Comments (0)
Boards Must Understand the Risks from Industrial Control Systems (ICS) Cyber Security
October 12, 2015 Added by:Joe Weiss
The Boards of Directors function is to identify and judge risk to the organization. As one member of a utility board stated, “A Board needs to know what the company is exposed to in terms of risk and what the consequences are of that exposure. Given a specific security deployment protecting an asset – what possibilities exist for breach?
Comments (0)
The 2015 ICS Cyber Security Conference
September 18, 2015 Added by:Joe Weiss
The 2015 ICS Cyber Security Conference will be October 26-29 at the Georgia Tech Hotel and Conference Center in Atlanta (www.icscybersecurityconference.com ). This will be the 15th in a series that began in 2002. The Conference will have some new twists, but will also stay true to its roots - ICS cyber security and what makes ICS cyber security different. Specifically, there will be....
Comments (0)
SCADA Systems Offered for Sale in the Underground Economy
June 22, 2015 Added by:Idan Aharoni
Access to such compromised SCADA systems that control various real-world equipment is being sold in the underground economy.
Comments (0)
Preview: Suits and Spooks London - May 6-7, 2015
April 16, 2015 Added by:Eduard Kovacs
With less than three weeks to go until Suits and Spooks London 2015 kicks off, the agenda is nearly finalized. Our first 2-day international event will host experts in cyber warfare, intelligence, advanced persistent threats, sophisticated malware, and political issues.
Comments (0)
Suits and Spooks DC 2015: The Agenda - Last Chance to Register
January 29, 2015 Added by:Mike Lennon
Suits and Spooks DC is less than one week away! The event will be held at the Ritz-Carlton, Pentagon City on February 4-5. Due to multiple sell-out events, we have expanded our attendee capacity to 200, but the event is again close to being sold out.
Comments (2)
The Security Industry and a Look Ahead
December 03, 2014 Added by:Art Coviello
I am cautiously optimistic about the prospects for collaboration and collective progress in the private sector as companies and industries are recognizing that in the digital world, no one is an island. We’re more like an archipelago and we’re starting to build bridges.
Comments (0)
First Victims of the Stuxnet Worm Revealed
November 11, 2014 Added by:InfosecIsland News
Kaspersky Lab today announced that after analyzing more than 2,000 Stuxnet files collected over a two-year period, it can identify the first victims of the Stuxnet worm.
Comments (0)
The Chinese Truly are Attacking our Critical Infrastructure
October 17, 2014 Added by:Joe Weiss
Bob Radvanovsky from Infracritical took a similar approach and the results are astounding. He acquired some Ruggedom switches from E-Bay and set up a network emulating a well pumping station. Within 2 hours of connecting the systems, he was being attacked primarily from China.
Comments (0)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids
- COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider