Sched.com Conference Mobile Apps
2014 ICS Cyber Security Conference
has ended
Create Your Own Event
2014 ICS Cyber Security Conference
Welcome to the Interactive Agenda for the
2014 ICS Cyber Security Conference
!
(View the Full ICS Cyber Security Conference Website
Here
)
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Attendees
Search
or browse by date + venue
Breakout Session
Breaks
Conference Services
Main Track
Workshops
Sign up
or
log in
to bookmark your favorites and sync them to your phone or calendar.
menu
Menu
Log in
Sign up
Schedule
Speakers
Attendees
Search
tune
Filter sessions
Simple
Expanded
Grid
By Venue
Monday
, October 20
Conference Room A
12:00pm •
Cyber Threats 101
2:00pm •
Authentication in Critical Infrastructure
3:00pm •
Operation Sandworm: Threat Campaign Overview and Risks to Critical Infrastructure Operators
Conference Room B
12:00pm •
ICS for Non-ICS Personnel
Grand Ballroom
4:15pm •
Kaspersky Industrial Protection Simulation Competition
Sponsor Hallway
11:00am •
Registration and Badge Pick Up
Tuesday
, October 21
Conference Room A
11:00am •
Securing ICS from “Safe” Devices Turned Killers
3:45pm •
Centralized Cyber Security Management and Secure Remote Access to ICS/SCADA Systems for Oil Companies’ Globally Dispersed Assets
Conference Room B
3:45pm •
Observations for Improved ICS Reliability and Security
Dining Room
12:00pm •
Lunch
Grand Ballroom
8:00am •
Welcome to the 2014 ICS Cyber Security Conference
8:15am •
Current Industry Status
9:00am •
ICSCorsair: Taking Control of an ICS System Through a 4-20 mA Current Loop
10:15am •
Reflections from the Field on ICS Cyber Security
1:00pm •
Strengthening DCS Processors and Networks – Recovery from a Significant ICS Cyber Incident
1:45pm •
Integrating The Alphabet Soup of Standards
3:00pm •
Observations and Conclusions from Project SHINE - ICSs Connected to the Internet
4:30pm •
Big Data Use in Identifying Cyber and Operational Threats
5:15pm •
15 incidents in 15 minutes
Sponsor Hallway
7:00am •
Registration and Badge Pick Up
7:00am •
Breakfast
9:45am •
Break - Exhibits Open
2:30pm •
Break - Exhibits Open
5:45pm •
VIP Cocktail Reception - Exhibits Open
Wednesday
, October 22
Conference Room A
3:30pm •
How Managing Privileged Accounts Can Help You With Maintaining NERC CIP Requirements
4:15pm •
Best Practices on Implementing Modern IT Security Technologies and Applying them to OT Environments
5:00pm •
Simple, Scalable, Secure…The Future is Now!
Conference Room B
3:30pm •
Why ICS Organizations and AV Security Vendors See ICS Cyber Security Differently
5:00pm •
Deploying Unidirectional Gateways to Secure Offshore Platforms
Dining Room
12:15pm •
Lunch
Grand Ballroom
8:00am •
Discussion on Unisys Report for Critical Infrastructure – How Applicable is it?
8:45am •
Approach to Identify Consequences of Cyber Vulnerabilities
9:30am •
DOD ICS Cyber Security Test Bed
10:45am •
Just How Easy is it to Hack a DCS?
11:30am •
Patch Management in the Industrial Automation and Control Systems Environment
1:15pm •
Aurora discussions – Review of INL Test; Relay Vulnerabilities Affecting Aurora
2:00pm •
Aurora Hardware Mitigation: Utility Test Bed Status and Results to Date
4:15pm •
Analysis of Cyber Security Compliance and Laboratory Design for Pentesting in a Brazilian Substation
Sponsor Hallway
7:00am •
Registration and Badge Pick Up
7:00am •
Breakfast
10:15am •
Break - Exhibits Open
10:15am •
Break - Exhibits Open
3:00pm •
Break - Exhibits Open
5:45pm •
VIP Cocktail Reception - Exhibits Open
Thursday
, October 23
Dining Room
12:15pm •
Lunch
Grand Ballroom
8:00am •
Air Force Institute of Technology Efforts on ICS Cyber Security
8:45am •
SPIDERS - Cybersecurity in Microgrids- Security and Resiliency for Facilities and Utilities
9:30am •
5 Steps To Building a Successful ICS Cyber Security Program
10:45am •
Deep Dive into RIPE Methodology
11:30am •
Scaling Building Automation Defense
1:30pm •
Adapting Safety Strategies to your ICS Security Program
2:15pm •
Lessons Learned from Onsite Industrial Security Assessments
3:00pm •
Secure Authentication for End-point Devices Including ICS Field Devices
3:45pm •
Conference Summary and Closing Remarks
Sponsor Hallway
7:00am •
Breakfast
7:00am •
Registration and Badge Pick Up
10:15am •
Break - Exhibits Open
Timezone
2014 ICS Cyber Security Conference
America/New York
Filter By Date
2014 ICS Cyber Security Conference
Oct 20
-
23, 2014
Monday
, October 20
Tuesday
, October 21
Wednesday
, October 22
Thursday
, October 23
Filter By Venue
Georgia Tech Hotel and Conference Center, 800 Spring St NW, Atlanta, GA 30308, U
Sort schedule by Venue
Conference Room A
Conference Room B
Dining Room
Grand Ballroom
Sponsor Hallway
Filter By Type
Breakout Session
Breaks
Conference Services
Main Track
Workshops
Recently Active Attendees
ET
Events Team
NV
Neville van der Merwe
Laura Clark
D
deidson0106
MW
Michael Wilson
Katie Schooling
MC
Matthew Crook
HG
Harry Gianakis
More →
Filter sessions
Apply filters to sessions.
close
Dates
Monday
, October 20
Tuesday
, October 21
Wednesday
, October 22
Thursday
, October 23
Venue
Conference Room A
Conference Room B
Dining Room
Grand Ballroom
Sponsor Hallway
Session Type
Breakout Session
Breaks
Conference Services
Main Track
Workshops
Other Filters