
<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Uncategorized Archives - Industrial Control Systems (ICS) Cybersecurity Conference</title>
	<atom:link href="https://www.icscybersecurityconference.com/category/uncategorized/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.icscybersecurityconference.com/category/uncategorized/</link>
	<description>ICS Cybersecurity Conference - Industrial/SCADA Cybersecurity</description>
	<lastBuildDate>Sat, 24 Sep 2022 18:09:31 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.icscybersecurityconference.com/wp-content/uploads/2016/09/favicon.png</url>
	<title>Uncategorized Archives - Industrial Control Systems (ICS) Cybersecurity Conference</title>
	<link>https://www.icscybersecurityconference.com/category/uncategorized/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>NSA, CISA Explain How Adversaries Plan and Execute ICS/OT Attacks</title>
		<link>https://www.icscybersecurityconference.com/nsa-cisa-explain-how-adversaries-plan-and-execute-ics-ot-attacks/</link>
		
		<dc:creator><![CDATA[Eduard Kovacs]]></dc:creator>
		<pubDate>Sat, 24 Sep 2022 18:09:31 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=19340</guid>

					<description><![CDATA[<p>A joint advisory describes five typical steps involved in planning and executing an attack on Industrial control systems (ICS) and other operational technology (OT) systems</p>
<p>The post <a href="https://www.icscybersecurityconference.com/nsa-cisa-explain-how-adversaries-plan-and-execute-ics-ot-attacks/">NSA, CISA Explain How Adversaries Plan and Execute ICS/OT Attacks</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Russia-Linked Pipedream/Incontroller ICS Malware Designed to Target Energy Facilities</title>
		<link>https://www.icscybersecurityconference.com/russia-linked-pipedream-incontroller-ics-malware-designed-to-target-energy-facilities/</link>
		
		<dc:creator><![CDATA[Eduard Kovacs]]></dc:creator>
		<pubDate>Thu, 14 Apr 2022 14:17:25 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[malware]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=19299</guid>

					<description><![CDATA[<p>A modular ICS attack framework and a collection of custom-made tools, can be used by threat actors to target ICS and SCADA devices, including programmable logic controllers (PLCs) from Schneider Electric and Omron, and OPC UA servers.</p>
<p>The post <a href="https://www.icscybersecurityconference.com/russia-linked-pipedream-incontroller-ics-malware-designed-to-target-energy-facilities/">Russia-Linked Pipedream/Incontroller ICS Malware Designed to Target Energy Facilities</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>MITRE Releases ATT&#038;CK Knowledge Base for Industrial Control Systems</title>
		<link>https://www.icscybersecurityconference.com/mitre-releases-attck-knowledge-base-for-industrial-control-systems/</link>
					<comments>https://www.icscybersecurityconference.com/mitre-releases-attck-knowledge-base-for-industrial-control-systems/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Wed, 08 Jan 2020 16:22:59 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[ATT&CK]]></category>
		<category><![CDATA[ICS]]></category>
		<category><![CDATA[industrial]]></category>
		<category><![CDATA[MITRE]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=4183</guid>

					<description><![CDATA[<p>(Eduard Kovacs &#8211; SecurityWeek) MITRE on Tuesday announced the initial release of a version of its ATT&#38;CK knowledge base that covers the tactics and techniques used by malicious actors when targeting industrial control systems (ICS). MITRE’s ATT&#38;CK framework has been widely used by cybersecurity professionals to describe and classify attacker behavior and assess an organization’s risks. The new ATT&#38;CK for ICS knowledge base builds upon it in an effort to help critical infrastructure and other organizations whose environments house ICS. In addition [&#8230;]</p>
<p>The post <a href="https://www.icscybersecurityconference.com/mitre-releases-attck-knowledge-base-for-industrial-control-systems/">MITRE Releases ATT&#038;CK Knowledge Base for Industrial Control Systems</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/mitre-releases-attck-knowledge-base-for-industrial-control-systems/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Jennifer Leggio Joins Claroty as Chief Marketing Officer</title>
		<link>https://www.icscybersecurityconference.com/jennifer-leggio-joins-claroty-as-chief-marketing-officer/</link>
					<comments>https://www.icscybersecurityconference.com/jennifer-leggio-joins-claroty-as-chief-marketing-officer/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Mon, 06 Jan 2020 18:32:51 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=4156</guid>

					<description><![CDATA[<p>Industrial cybersecurity firm Claroty announced that Jennifer Leggio has taken the role of Chief Marketing Officer (CMO) at the company.</p>
<p>The post <a href="https://www.icscybersecurityconference.com/jennifer-leggio-joins-claroty-as-chief-marketing-officer/">Jennifer Leggio Joins Claroty as Chief Marketing Officer</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/jennifer-leggio-joins-claroty-as-chief-marketing-officer/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Leadership, Security, and Support at the Clinton White House (Video)</title>
		<link>https://www.icscybersecurityconference.com/leadership-security-and-support-at-the-clinton-white-house-video/</link>
					<comments>https://www.icscybersecurityconference.com/leadership-security-and-support-at-the-clinton-white-house-video/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Tue, 30 Jul 2019 23:42:32 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=1850</guid>

					<description><![CDATA[<p>Presented at SecurityWeek&#8217;s 2018 ICS Cyber Security Conference How would you handle leadership in this the most stressful Chief Information Officer (CIO) job in the World – being the CIO at The White House? Colonel Gelhardt answers this question, and talks about the leadership and mentorship he used and how you can use the same skills in the civilian world. If he can do it so can you! Speaker: Colonel Mark Gelhardt &#8211; Former CIO for President Clinton</p>
<p>The post <a href="https://www.icscybersecurityconference.com/leadership-security-and-support-at-the-clinton-white-house-video/">Leadership, Security, and Support at the Clinton White House (Video)</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/leadership-security-and-support-at-the-clinton-white-house-video/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Exfiltrating Reconnaissance Data from Air-Gapped ICS/SCADA Networks By Injecting Ladder Logic Code into PLCs</title>
		<link>https://www.icscybersecurityconference.com/exfiltrating-reconnaissance-data-from-air-gapped-ics-scada-networks-by-injecting-ladder-logic-code-into-plcs/</link>
					<comments>https://www.icscybersecurityconference.com/exfiltrating-reconnaissance-data-from-air-gapped-ics-scada-networks-by-injecting-ladder-logic-code-into-plcs/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Tue, 30 Jul 2019 23:40:21 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=1849</guid>

					<description><![CDATA[<p>Presented first at SecurityWeek&#8217;s 2017 ICS Cyber Security Conference, this presentation explains how to inject specially-crafted ladder logic code into a Siemens S7-1200 PLC. The code uses memory copy operations to generate frequency-modulated RF signals slightly below the AM band (340kHz-420kHz), with the modulation representing encoded reconnaissance data. The signal can then be picked up by a nearby antenna and decoded using a low-cost Software-Defined Radio (SDR) and a PC. The receiving equipment can be located just outside the facility [&#8230;]</p>
<p>The post <a href="https://www.icscybersecurityconference.com/exfiltrating-reconnaissance-data-from-air-gapped-ics-scada-networks-by-injecting-ladder-logic-code-into-plcs/">Exfiltrating Reconnaissance Data from Air-Gapped ICS/SCADA Networks By Injecting Ladder Logic Code into PLCs</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/exfiltrating-reconnaissance-data-from-air-gapped-ics-scada-networks-by-injecting-ladder-logic-code-into-plcs/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Growing Threat of Drones</title>
		<link>https://www.icscybersecurityconference.com/the-growing-threat-of-drones/</link>
					<comments>https://www.icscybersecurityconference.com/the-growing-threat-of-drones/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Wed, 24 Jul 2019 11:12:59 +0000</pubDate>
				<category><![CDATA[OT Attacks]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[dones]]></category>
		<category><![CDATA[facility]]></category>
		<category><![CDATA[industrial]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[threat]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=1841</guid>

					<description><![CDATA[<p>Drones are an increasing threat to industrial sites, enabling various attacks (cyber and physical) that historically were only possible in close proximity to a facility or device.</p>
<p>The post <a href="https://www.icscybersecurityconference.com/the-growing-threat-of-drones/">The Growing Threat of Drones</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/the-growing-threat-of-drones/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cisco to Acquire OT Cybersecurity Firm Sentryo</title>
		<link>https://www.icscybersecurityconference.com/cisco-to-acquire-ot-cybersecurity-firm-sentryo/</link>
					<comments>https://www.icscybersecurityconference.com/cisco-to-acquire-ot-cybersecurity-firm-sentryo/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Thu, 06 Jun 2019 14:54:30 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=1829</guid>

					<description><![CDATA[<p>Cisco on Thursday announced that it has agreed to acquire privately-held operational technology (OT) cybersecurity firm&#160;Sentryo&#160;for an undisclosed sum.&#160; Founded in 2014 and headquartered in Lyon, France, Sentryo, provides device visibility and security solutions for industrial control system (ICS) networks and OT assets. “Sentryo’s industrial IoT/OT technology solution helps companies like those in the energy, manufacturing, oil and gas and transportation sectors ensure the resilience of their industrial networks and protect against cybersecurity attacks,” said Rob Salvagno, VP Global Corporate [&#8230;]</p>
<p>The post <a href="https://www.icscybersecurityconference.com/cisco-to-acquire-ot-cybersecurity-firm-sentryo/">Cisco to Acquire OT Cybersecurity Firm Sentryo</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/cisco-to-acquire-ot-cybersecurity-firm-sentryo/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Ransomware Attack Costs Aluminum Giant Norsk Hydro Tens of Millions of Dollars</title>
		<link>https://www.icscybersecurityconference.com/ransomware-attack-costs-aluminum-giant-norsk-hydro-tens-of-millions-of-dollars/</link>
					<comments>https://www.icscybersecurityconference.com/ransomware-attack-costs-aluminum-giant-norsk-hydro-tens-of-millions-of-dollars/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Wed, 05 Jun 2019 14:54:57 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[industrial]]></category>
		<category><![CDATA[Norsk Hydro]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=1828</guid>

					<description><![CDATA[<p>(Eduard Kovacs &#8211; SecurityWeek) &#8211; Norwegian aluminum giant Norsk Hydro lost $35-41 million in the first quarter of 2019 as a result of the ransomware attack and expects additional losses of $23-29 million in the second quarter. A piece of file-encrypting ransomware named LockerGoga started infecting Norsk Hydro systems on March 18. The attack caused disruptions at several of the company’s plants, forcing workers to rely on manual processes. Hydro has been highly transparent regarding the impact of the incident. [&#8230;]</p>
<p>The post <a href="https://www.icscybersecurityconference.com/ransomware-attack-costs-aluminum-giant-norsk-hydro-tens-of-millions-of-dollars/">Ransomware Attack Costs Aluminum Giant Norsk Hydro Tens of Millions of Dollars</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/ransomware-attack-costs-aluminum-giant-norsk-hydro-tens-of-millions-of-dollars/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>NIST Working on IIoT Security Guide for Energy Companies</title>
		<link>https://www.icscybersecurityconference.com/nist-working-on-iiot-security-guide-for-energy-companies/</link>
					<comments>https://www.icscybersecurityconference.com/nist-working-on-iiot-security-guide-for-energy-companies/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Tue, 07 May 2019 18:55:56 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[IIoT]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=1826</guid>

					<description><![CDATA[<p>(Eduard Kovacs &#8211; SecurityWeek) &#8211; The U.S. National Institute of Standards and Technology (NIST), through its National Cybersecurity Center of Excellence (NCCoE), this week announced that it’s working on a project whose goal is to help the energy sector secure industrial Internet of Things (IIoT) systems. A&#160;draft of the project&#160;was published on Monday and the NCCoE is hoping to get some feedback until June 5 that would help it “refine the challenge and scope.” IIoT is represented by sensors, instruments [&#8230;]</p>
<p>The post <a href="https://www.icscybersecurityconference.com/nist-working-on-iiot-security-guide-for-energy-companies/">NIST Working on IIoT Security Guide for Energy Companies</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/nist-working-on-iiot-security-guide-for-energy-companies/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
