About

Conference

SecurityWeek’s ICS Cyber Security Conference is the conference where ICS users, ICS vendors, system security providers and government representatives meet to discuss the latest cyber-incidents, analyze their causes and cooperate on solutions.

<We_can_help/>

What are you looking for?

>Articles posted by Industry News (Page 9)

Joe Weiss, founder of the Industrial Control Systems (ICS) Cyber Security Conference, and several leading experts were featured this week in PBS’ NOVA. The full episode, CyberWar Threat, is embedded here.

SecurityWeek’s 2015 ICS Cyber Security Conference Takes Place October 26 – 29th at the Georgia Tech Hotel and Conference Center in Atlanta. Online registration is available.

Description from PBS:

NOVA examines the science and technology behind cyber warfare and asks if we are already in the midst of a deadly new arms race. Already, highly sophisticated, stealthy computer programs such as the notorious Stuxnet worm can take over and even destroy the control systems that regulate everything from food factories to gas pipelines, power plants, and chemical facilities—even our cars. While the destruction of Iranian centrifuges may have delayed Iran’s bomb program and forestalled an Israeli attack, the attack has opened a Pandora’s Box, and now America’s own critical infrastructure is vulnerable to retaliation and attack. With leading defense experts and investigative journalists who have probed the murky realm of criminal and strategic hacking, NOVA examines the chilling new reality of cyberwar in which no nation or individual is safe from attack.

Joe Weiss, founder of the Industrial Control Systems (ICS) Cyber Security Conference, and several leading experts were featured this week in PBS' NOVA. The full episode, CyberWar Threat, is embedded here. SecurityWeek's 2015 ICS Cyber Security Conference Takes Place October 26 - 29th at the Georgia Tech Hotel and Conference Center in Atlanta. Online registration is available. Description from PBS: NOVA examines the science and technology behind cyber warfare and asks if we are already in the midst of a deadly new arms race. Already, highly sophisticated, stealthy computer

The Obama Administration on Sept. 14 announced a new “Smart Cities” Initiative that will invest over $160 million in federal research and leverage more than 25 new technology collaborations to help local communities tackle key challenges such as reducing traffic congestion, fighting crime, fostering economic growth, managing the effects of a changing climate, and improving the delivery of city services. As part of the initiative, the White House promised nearly $70 million in new spending and over $45 million in proposed

(SecurityWeek) - The number of publicly disclosed vulnerabilities affecting industrial control systems (ICS) has increased considerably since the Stuxnet attack, shows a report published on Wednesday by threat intelligence firm Recorded Future. Researchers have uncovered numerous vulnerabilities in ICS products over the past years and experts have often warned that attacks against critical infrastructure companies housing such systems can have devastating effects. However, so far there have been only a few reports of damaging ICS attacks, the most notable being the 2011

(SecurityWeek) - Schneider Electric has released firmware patches to address a couple of vulnerabilities affecting some of the company’s Modicon programmable logic controller (PLC) products. The security holes affect the following Modicon M340 Central Processing Units (CPUs) and ethernet communication modules: BMXNOC0401, BMXNOC0402, BMXNOE0100, BMXNOE0110, BMXNOE0110H, BMXNOR0200H, BMXP342020, BMXP342020H, BMXP342030, BMXP3420302, BMXP3420302H and BMXP342030H. The flaws were disclosed on August 8 at the DEF CON conference in Las Vegas by Elastica researcher Aditya K. Sood. The issues were reported by the expert to ICS-CERT

(SecurityWeek) - Charlie Miller and Chris Valasek, famous hardware hackers who recently demonstrated that some Fiat Chrysler cars can be remotely hijacked, have been hired by ride-hailing giant Uber. Miller revealed last week that he was leaving Twitter, the social media firm he had been working for in the past three years. The car hacking expert announced late on Friday that he will be working at Uber’s Advanced Technology Center. The Advanced Technology Center was launched in February as part of a strategic

The market for security solutions to protect the "Internet of Things (IoT) is expected to top $28 Billion by 2020, according to new market research report. According to the report, published by MarketsandMarkets, the IoT Security Market is expected to grow from  $6.89 Billion in 2015 to USD $28.90 Billion by 2020, representing a Compound Annual Growth Rate (CAGR) of 33.2% from 2015 to 2020. “The rise of security concerns in critical infrastructures such as utilities, smart grids, and manufacturing facilities is

The official Call for Papers for the 2015 Industrial Control Systems (ICS) Cyber Security Conference, to be held October 26 – 29, 2015 at the Georgia Tech Hotel and Conference Center in Atlanta, Georgia, USA, is now open. The conference is the foremost and longest-running cyber security-focused event series for the industrial control systems sectors and caters to the energy, water, utility, chemical, transportation, manufacturing, and other industrial and critical infrastructure organizations. With a long 13-year history, the conference has proven to

(SecurityWeek) - An attack launched by an advanced persistent threat (APT) group against an unnamed steel plant in Germany resulted in significant damage, according a new report. Cyberattacks on critical infrastructure are a reality and they're becoming more frequent. An IT security report for 2014 published by Germany's Federal Office for Information Security (BSI) on Wednesday describes a noteworthy incident that caused physical damage to a facility. According to the agency, sophisticated attackers used spear-phishing and social engineering to gain access to

Atlanta Oct. 20-23, 2014 - Georgia Tech Hotel and Conference Center  Following a sold out event in 2013, the 2014 ICS Cyber Security Conference is expected to attract more than 250 professionals from around the world and again sell out. Since 2002, the ICS Cyber Security Conference has gathered ICS cyber security stakeholders across various industries and attracts operations and control engineers, IT, government, vendors and academics. As the longest-running cyber security-focused conference for the industrial control systems sector, the event will cater to the energy, utility, chemical,

Longest Running ICS Cyber Security Conference Opens Call for Presentations for 2014 Event in Atlanta, Georgia SecurityWeek today announced the official Call for Presentations for the 2014 Industrial Control Systems (ICS) Cyber Security Conference, to be held October 20 – 23, 2014 at the Georgia Tech Hotel and Conference Center in Atlanta, Georgia. Now in its 12th year, the conference is the foremost and longest-running cyber security-focused event series for the industrial control systems sectors. The conference will cater to the energy, water, utility, chemical,