
<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ICS Archives - Industrial Control Systems (ICS) Cybersecurity Conference</title>
	<atom:link href="https://www.icscybersecurityconference.com/tag/ics/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.icscybersecurityconference.com/tag/ics/</link>
	<description>ICS Cybersecurity Conference - Industrial/SCADA Cybersecurity</description>
	<lastBuildDate>Thu, 04 Sep 2025 17:42:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.icscybersecurityconference.com/wp-content/uploads/2016/09/favicon.png</url>
	<title>ICS Archives - Industrial Control Systems (ICS) Cybersecurity Conference</title>
	<link>https://www.icscybersecurityconference.com/tag/ics/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>NEW Training Course Offered! Cyber Attack Methods (CAM) for Cyber-Physical Systems</title>
		<link>https://www.icscybersecurityconference.com/new-training-course-offered-cyber-attack-methods-cam-for-cyber-physical-systems/</link>
		
		<dc:creator><![CDATA[News Team]]></dc:creator>
		<pubDate>Thu, 04 Sep 2025 17:11:09 +0000</pubDate>
				<category><![CDATA[Training]]></category>
		<category><![CDATA[Cyber-physical]]></category>
		<category><![CDATA[ICS]]></category>
		<category><![CDATA[OT]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=20328</guid>

					<description><![CDATA[<p>SecurityWeek is thrilled to announce a new, multi-day, hands-on training course offering taking place alongside the 2025 ICS Cybersecurity Conference. US ONLY: This training is available for United States Citizens only. Workshop Registration Fee: $3995 &#8211; Includes certificate of course completion, all meals and access to all conference sessions and social functions. Limited seats available. Reserve your spot today! Note: This hands on training will take place Tuesday, October 28th &#8211; Thursday, October 30th. Day 1 will be a full [&#8230;]</p>
<p>The post <a href="https://www.icscybersecurityconference.com/new-training-course-offered-cyber-attack-methods-cam-for-cyber-physical-systems/">NEW Training Course Offered! Cyber Attack Methods (CAM) for Cyber-Physical Systems</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>2023 Full Day ICS Cybersecurity Training Courses</title>
		<link>https://www.icscybersecurityconference.com/training/</link>
		
		<dc:creator><![CDATA[News Team]]></dc:creator>
		<pubDate>Wed, 27 Jul 2022 01:11:43 +0000</pubDate>
				<category><![CDATA[ICS]]></category>
		<category><![CDATA[Training]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[OT]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=19313</guid>

					<description><![CDATA[<p>Conference attendees can register for optional full-day ICS cybersecurity training sessions that take place on Monday, October 24th, 2022.</p>
<p>The post <a href="https://www.icscybersecurityconference.com/training/">2023 Full Day ICS Cybersecurity Training Courses</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Colonial Pipeline Still Mostly Offline After Ransomware Attack</title>
		<link>https://www.icscybersecurityconference.com/colonial-pipeline-still-mostly-offline-after-ransomware-attack/</link>
					<comments>https://www.icscybersecurityconference.com/colonial-pipeline-still-mostly-offline-after-ransomware-attack/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Mon, 10 May 2021 10:19:48 +0000</pubDate>
				<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[OT Attacks]]></category>
		<category><![CDATA[ICS]]></category>
		<category><![CDATA[OT]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=14291</guid>

					<description><![CDATA[<p>The Colonial Pipeline is working on a restart plan after a ransomware attack triggered the company to halt all pipeline operations on May 7, 2021.</p>
<p>The post <a href="https://www.icscybersecurityconference.com/colonial-pipeline-still-mostly-offline-after-ransomware-attack/">Colonial Pipeline Still Mostly Offline After Ransomware Attack</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/colonial-pipeline-still-mostly-offline-after-ransomware-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Past &#038; Future of Integrity Attacks in ICS Environments (Video)</title>
		<link>https://www.icscybersecurityconference.com/the-past-future-of-integrity-attacks-in-ics-environments-video/</link>
					<comments>https://www.icscybersecurityconference.com/the-past-future-of-integrity-attacks-in-ics-environments-video/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Tue, 14 Jan 2020 19:28:40 +0000</pubDate>
				<category><![CDATA[ICS]]></category>
		<category><![CDATA[OT Attacks]]></category>
		<category><![CDATA[attacks]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=4250</guid>

					<description><![CDATA[<p>Integrity-based attacks can produce significant impacts through undermining a physical process and calling into doubt the viability of a specific facility.</p>
<p>The post <a href="https://www.icscybersecurityconference.com/the-past-future-of-integrity-attacks-in-ics-environments-video/">The Past &#038; Future of Integrity Attacks in ICS Environments (Video)</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/the-past-future-of-integrity-attacks-in-ics-environments-video/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>MITRE Releases ATT&#038;CK Knowledge Base for Industrial Control Systems</title>
		<link>https://www.icscybersecurityconference.com/mitre-releases-attck-knowledge-base-for-industrial-control-systems/</link>
					<comments>https://www.icscybersecurityconference.com/mitre-releases-attck-knowledge-base-for-industrial-control-systems/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Wed, 08 Jan 2020 16:22:59 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[ATT&CK]]></category>
		<category><![CDATA[ICS]]></category>
		<category><![CDATA[industrial]]></category>
		<category><![CDATA[MITRE]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=4183</guid>

					<description><![CDATA[<p>(Eduard Kovacs &#8211; SecurityWeek) MITRE on Tuesday announced the initial release of a version of its ATT&#38;CK knowledge base that covers the tactics and techniques used by malicious actors when targeting industrial control systems (ICS). MITRE’s ATT&#38;CK framework has been widely used by cybersecurity professionals to describe and classify attacker behavior and assess an organization’s risks. The new ATT&#38;CK for ICS knowledge base builds upon it in an effort to help critical infrastructure and other organizations whose environments house ICS. In addition [&#8230;]</p>
<p>The post <a href="https://www.icscybersecurityconference.com/mitre-releases-attck-knowledge-base-for-industrial-control-systems/">MITRE Releases ATT&#038;CK Knowledge Base for Industrial Control Systems</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/mitre-releases-attck-knowledge-base-for-industrial-control-systems/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Intelligence Gathering on U.S. Critical Infrastructure</title>
		<link>https://www.icscybersecurityconference.com/intelligence-gathering-on-u-s-critical-infrastructure/</link>
					<comments>https://www.icscybersecurityconference.com/intelligence-gathering-on-u-s-critical-infrastructure/#respond</comments>
		
		<dc:creator><![CDATA[Eduard Kovacs]]></dc:creator>
		<pubDate>Thu, 10 Oct 2019 15:04:35 +0000</pubDate>
				<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[ICS]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[devices]]></category>
		<category><![CDATA[exposed]]></category>
		<category><![CDATA[facilities]]></category>
		<category><![CDATA[industrial]]></category>
		<category><![CDATA[intelligence]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[OSINT]]></category>
		<category><![CDATA[scanning]]></category>
		<category><![CDATA[shodan]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=3027</guid>

					<description><![CDATA[<p>How Open Source Intelligence can be applied to reconnaissance on critical infrastructure. In many cases it’s possible to narrow a search to specific buildings like power plants, wastewater plants, or chemical and manufactured facilities. The research consists of 26,000 exposed devices in United States.</p>
<p>The post <a href="https://www.icscybersecurityconference.com/intelligence-gathering-on-u-s-critical-infrastructure/">Intelligence Gathering on U.S. Critical Infrastructure</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/intelligence-gathering-on-u-s-critical-infrastructure/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Side-Channel Attacks Put Critical Infrastructure at Risk</title>
		<link>https://www.icscybersecurityconference.com/side-channel-attacks-put-critical-infrastructure-at-risk/</link>
					<comments>https://www.icscybersecurityconference.com/side-channel-attacks-put-critical-infrastructure-at-risk/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Mon, 05 Nov 2018 13:52:26 +0000</pubDate>
				<category><![CDATA[OT Attacks]]></category>
		<category><![CDATA[attacks]]></category>
		<category><![CDATA[CPU]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[devices]]></category>
		<category><![CDATA[electric]]></category>
		<category><![CDATA[grid]]></category>
		<category><![CDATA[hardware]]></category>
		<category><![CDATA[ICS]]></category>
		<category><![CDATA[power]]></category>
		<category><![CDATA[SCADA]]></category>
		<category><![CDATA[Side-Channel]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">http://www.icscybersecurityconference.com/?p=1730</guid>

					<description><![CDATA[<p>ICS Devices Vulnerable to Side-Channel Attacks: Researcher Shows (Eduard Kovacs &#8211; SecurityWeek)  Side-channel attacks can pose a serious threat to industrial control systems (ICS), a researcher warned last month at SecurityWeek’s ICS Cyber Security Conference in Atlanta, GA. Demos Andreou, a lead engineer at power management company Eaton, has conducted an analysis of protection devices typically used in the energy sector, specifically in power distribution stations. Side-channel attacks can be used to extract data from a system based on information [&#8230;]</p>
<p>The post <a href="https://www.icscybersecurityconference.com/side-channel-attacks-put-critical-infrastructure-at-risk/">Side-Channel Attacks Put Critical Infrastructure at Risk</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/side-channel-attacks-put-critical-infrastructure-at-risk/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>[Video] Hunting for Xenotime, Creators of TRITON-TRISIS ICS Malware</title>
		<link>https://www.icscybersecurityconference.com/video-hunting-for-xenotime-creators-of-triton-trisis-ics-malware/</link>
					<comments>https://www.icscybersecurityconference.com/video-hunting-for-xenotime-creators-of-triton-trisis-ics-malware/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Wed, 31 Oct 2018 18:29:34 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Dragos]]></category>
		<category><![CDATA[ICS]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Robert M. Lee]]></category>
		<category><![CDATA[TRISIS]]></category>
		<category><![CDATA[Triton]]></category>
		<category><![CDATA[XENOTIME]]></category>
		<guid isPermaLink="false">http://www.icscybersecurityconference.com/?p=1729</guid>

					<description><![CDATA[<p>Presented at SecurityWeek&#8217;s 2018 ICS Cyber Security Conference Speakers: Robert Lee &#8211; CEO, Dragos Marc Seitz &#8211; Threat Analyst, Dragos The activity group responsible for the TRISIS/TRITON malware is identified as XENOTIME. After the attack on the safety instrumented system in 2017 the group remained active targeting other environments with different safety systems in other regions of the world. Hunting for the behaviors of this group allows defenders to not only search for existing threats but also identify new threats [&#8230;]</p>
<p>The post <a href="https://www.icscybersecurityconference.com/video-hunting-for-xenotime-creators-of-triton-trisis-ics-malware/">[Video] Hunting for Xenotime, Creators of TRITON-TRISIS ICS Malware</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/video-hunting-for-xenotime-creators-of-triton-trisis-ics-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Red Team/Blue Team ICS Cyber Security Training</title>
		<link>https://www.icscybersecurityconference.com/red-team-blue-team-ics-cyber-security-training/</link>
					<comments>https://www.icscybersecurityconference.com/red-team-blue-team-ics-cyber-security-training/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Fri, 14 Sep 2018 16:43:07 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ICS]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">http://www.icscybersecurityconference.com/?p=1659</guid>

					<description><![CDATA[<p>SecurityWeek is happy to be partnering with LEO Cyber Security to offer a half-day Red Team/Blue Team ICS Cyber Security Training workshop at SecurityWeek’s 2018 ICS Cyber Security Conference. The workshop will take place on Monday, October 22 and is available as an option for conference attendees. (Registration available here) What is Red Team/Blue Team Training? Security aware and knowledgeable users serve as the “front line” of your overall security posture. As such, training is one of the most essential components [&#8230;]</p>
<p>The post <a href="https://www.icscybersecurityconference.com/red-team-blue-team-ics-cyber-security-training/">Red Team/Blue Team ICS Cyber Security Training</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/red-team-blue-team-ics-cyber-security-training/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ICS Honeypot Highlights Danger to Critical Systems From Criminal Hackers</title>
		<link>https://www.icscybersecurityconference.com/ics-honeypot-highlights-danger-to-critical-systems-from-criminal-hackers/</link>
					<comments>https://www.icscybersecurityconference.com/ics-honeypot-highlights-danger-to-critical-systems-from-criminal-hackers/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Tue, 07 Aug 2018 13:49:56 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[grid]]></category>
		<category><![CDATA[honeypot]]></category>
		<category><![CDATA[ICS]]></category>
		<guid isPermaLink="false">http://www.icscybersecurityconference.com/?p=1648</guid>

					<description><![CDATA[<p>(SecurityWeek &#8211; Kevin Townsend) &#8211; Security firm Cybereason established a sophisticated honeypot masquerading as a power transmission substation for a major electricity provider. The purpose was to attract attackers and analyze how they operate against the energy sector of the critical infrastructure. Within two days of going live on June 17, the honeypot developed and operated by Cybereason was found, prepped by a black-market reseller, and sold on in the dark web underworld. xDedic RDP Patch was found in the [&#8230;]</p>
<p>The post <a href="https://www.icscybersecurityconference.com/ics-honeypot-highlights-danger-to-critical-systems-from-criminal-hackers/">ICS Honeypot Highlights Danger to Critical Systems From Criminal Hackers</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/ics-honeypot-highlights-danger-to-critical-systems-from-criminal-hackers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
