Industrial Control Systems (ICS)
Cyber Security Conference

June 16-18, 2020 | Singapore (Now Virtual)
October 19-22, 2020 | USA (Now Virtual)

The Hub for Industrial Cybersecurity

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cyber security.

October 19-22, 2020

USA (Virtual)

Register Now

June 16-18, 2020

Singapore

View Event


About the Conference

Originally scheduled to take place at InterContinental Atlanta, the 2020 conference will now take place as a virtual event in SecurityWeek’s virtual conference environment. The same presentations will be offered and delegates will have the ability to interact with presenters and solutions providers. 

Virtual Conference - Singapore ICS Cyber Security

Register Now

Given the impact on COVID-19, the 2020 ICS Cyber Security Conference will be held virtually, in SecurityWeek’s Virtual Conference Center, a fully-branded, virtual conference center that provides attendees with the opportunity to network and interact with each other from anywhere in the world.

SecurityWeek’s ICS Cyber Security Conference is the conference where ICS users, ICS vendors, system security providers and government representatives meet to discuss the latest cyber-incidents, analyze their causes and cooperate on solutions. Since its first edition in 2002, the conference has attracted a continually rising interest as both the stakes of critical infrastructure protection and the distinctiveness of securing ICSs become increasingly apparent.

Select Sessions for the 2019 Agenda Included:

    • Fireside chat with Admiral (Ret.) Mike Rogers
    • The Past and Future of Integrity-Based Attacks in ICS Environments
    • Utilizing A Data Diode for Edge Analytics in Industrial Networks
    • Advanced ICS/SCADA Hacking Training
    • Adventures in IT/OT Convergence
    • How to Pull Binaries From OT Equipment
    • Use of Virtual Network TAPs in ICS Environments
    • Level 0 Exploits on PLC Based Systems
    • The Homogenization of ICS Attacker Toolsets
    • Hardening a Modern ICS Environment
    • Red Team/Blue Team ICS Cyber Security Training
    • Digital Twin Security Analysis and Best Practices
    • Automated Discovery of Level 0 Sensors and their Interdependencies
    • Industrial Control Deception Environments – Levels of Simulation
    • Deep Dive on IEC 62443 Cybersecurity Specifications
    • How to Accurately Gauge Your Current ICS Cybersecurity Posture
    • Bringing DevSecOps to ICS
    • The Convergence of Safety and Cybersecurity
    • Segregating a Flat Network for Increased Reliability and Security
    • Much Much More! Register for Conference & Training

Featured Speakers | 2019


  • Admiral (Ret.) Michael S. RogersAdmiral Mike Rogers
    Former Head of NSA, U.S. Cyber Command
  • Juan Lopez Jr., PhD
    Cyber-Physical R&D Manager
    Oak Ridge National Lab
  • Joe SlowikJoe Slowik
    Principal Adversary Hunter
    Dragos
  • Ben StirlingBen Stirling
    Lead, Generation Cyber Security
    Vistra Energy
  • Rob Garry
    Executive Chief Engineer
    GE Power
  • Derek Harp
    Founder & Chairman
    (CS)2AI
  • Clint Bodungen
    Founder & CEO
    ThreatGEN
  • Kurt John
    Chief Cybersecurity Officer
    Siemens USA

DIAMOND SPOSNOR

Platinum Sponsors


https://www.icscybersecurityconference.com/wp-content/uploads/2019/10/Silver-Sponsors-ICS-SCADAv2.jpg

ICS Cyber Security Blog


January 14, 2020

Integrity-based attacks can produce significant impacts through undermining a physical process and calling into doubt the viability of a specific facility.

January 8, 2020

(Eduard Kovacs – SecurityWeek) MITRE on Tuesday announced the initial release of a version of its ATT&CK knowledge base that covers the tactics and techniques used by malicious actors when targeting industrial control systems (ICS). MITRE’s ATT&CK framework has been widely used by cybersecurity professionals to describe and classify attacker behavior and assess an organization’s […]

January 6, 2020

Industrial cybersecurity firm Claroty announced that Jennifer Leggio has taken the role of Chief Marketing Officer (CMO) at the company.

October 10, 2019

How Open Source Intelligence can be applied to reconnaissance on critical infrastructure. In many cases it’s possible to narrow a search to specific buildings like power plants, wastewater plants, or chemical and manufactured facilities. The research consists of 26,000 exposed devices in United States.


ABOUT THE

Conference

As the largest and longest-running cyber security-focused conference for the industrial control systems sector, the event caters to the energy, utility, chemical, transportation, manufacturing, and other industrial and critical infrastructure organizations, including the military.

The conference will address topics covering ICSs, including protection for SCADA systems, plant control systems, engineering workstations, substation equipment, programmable logic controllers (PLCs), and other field control system devices.

https://www.icscybersecurityconference.com/wp-content/uploads/2020/03/Singapore-Virtual-event.png

VENUE

SecurityWeek Virtual Conference Center

A Fully Immersive Virtual Experience


EMAIL