
<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>SCADA Archives - Industrial Control Systems (ICS) Cybersecurity Conference</title>
	<atom:link href="https://www.icscybersecurityconference.com/tag/scada/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.icscybersecurityconference.com/tag/scada/</link>
	<description>ICS Cybersecurity Conference - Industrial/SCADA Cybersecurity</description>
	<lastBuildDate>Mon, 05 Nov 2018 13:52:26 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.icscybersecurityconference.com/wp-content/uploads/2016/09/favicon.png</url>
	<title>SCADA Archives - Industrial Control Systems (ICS) Cybersecurity Conference</title>
	<link>https://www.icscybersecurityconference.com/tag/scada/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Side-Channel Attacks Put Critical Infrastructure at Risk</title>
		<link>https://www.icscybersecurityconference.com/side-channel-attacks-put-critical-infrastructure-at-risk/</link>
					<comments>https://www.icscybersecurityconference.com/side-channel-attacks-put-critical-infrastructure-at-risk/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Mon, 05 Nov 2018 13:52:26 +0000</pubDate>
				<category><![CDATA[OT Attacks]]></category>
		<category><![CDATA[attacks]]></category>
		<category><![CDATA[CPU]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[devices]]></category>
		<category><![CDATA[electric]]></category>
		<category><![CDATA[grid]]></category>
		<category><![CDATA[hardware]]></category>
		<category><![CDATA[ICS]]></category>
		<category><![CDATA[power]]></category>
		<category><![CDATA[SCADA]]></category>
		<category><![CDATA[Side-Channel]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">http://www.icscybersecurityconference.com/?p=1730</guid>

					<description><![CDATA[<p>ICS Devices Vulnerable to Side-Channel Attacks: Researcher Shows (Eduard Kovacs &#8211; SecurityWeek)  Side-channel attacks can pose a serious threat to industrial control systems (ICS), a researcher warned last month at SecurityWeek’s ICS Cyber Security Conference in Atlanta, GA. Demos Andreou, a lead engineer at power management company Eaton, has conducted an analysis of protection devices typically used in the energy sector, specifically in power distribution stations. Side-channel attacks can be used to extract data from a system based on information [&#8230;]</p>
<p>The post <a href="https://www.icscybersecurityconference.com/side-channel-attacks-put-critical-infrastructure-at-risk/">Side-Channel Attacks Put Critical Infrastructure at Risk</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/side-channel-attacks-put-critical-infrastructure-at-risk/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Rockwell Patches Vulnerability Impacting Safety Controllers From Several Vendors</title>
		<link>https://www.icscybersecurityconference.com/rockwell-patches-vulnerability-impacting-safety-controllers-from-several-vendors/</link>
					<comments>https://www.icscybersecurityconference.com/rockwell-patches-vulnerability-impacting-safety-controllers-from-several-vendors/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Mon, 25 Jun 2018 12:27:35 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Controller]]></category>
		<category><![CDATA[CVE-2017-9312]]></category>
		<category><![CDATA[DoS]]></category>
		<category><![CDATA[ICS]]></category>
		<category><![CDATA[Rockwell]]></category>
		<category><![CDATA[SCADA]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">http://www.icscybersecurityconference.com/?p=1618</guid>

					<description><![CDATA[<p>(Eduard Kovacs &#8211; SecurityWeek) &#8211; In April, at SecurityWeek’s ICS Cyber Security Conference in Singapore, industrial cybersecurity firm Applied Risk disclosed the details of a serious denial-of-service (DoS) vulnerability affecting safety controllers from several major vendors. Rockwell Automation is one of those vendors and the company has now released patches for its products. In an advisory published last week, Rockwell Automation informed customers that the flaw impacts Allen-Bradley CompactLogix 5370 and Compact GuardLogix 5370 programmable automation controllers, which are used to control [&#8230;]</p>
<p>The post <a href="https://www.icscybersecurityconference.com/rockwell-patches-vulnerability-impacting-safety-controllers-from-several-vendors/">Rockwell Patches Vulnerability Impacting Safety Controllers From Several Vendors</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/rockwell-patches-vulnerability-impacting-safety-controllers-from-several-vendors/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Critical Vulnerabilities Found in Siemens Building Automation, Telecontrol Products</title>
		<link>https://www.icscybersecurityconference.com/critical-vulnerabilities-found-in-siemens-building-automation-telecontrol-products/</link>
					<comments>https://www.icscybersecurityconference.com/critical-vulnerabilities-found-in-siemens-building-automation-telecontrol-products/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Wed, 28 Mar 2018 15:14:00 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[SCADA]]></category>
		<category><![CDATA[Siemens]]></category>
		<category><![CDATA[SIMATIC]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">http://www.icscybersecurityconference.com/?p=1606</guid>

					<description><![CDATA[<p>(Eduard Kovacs / SecurityWeek) &#8211; Industrial giant Siemens this week warned that critical vulnerabilities have been found in some of its telecontrol and building automation products, and revealed that some SIMATIC systems are affected by a high severity flaw. One advisory published by the company describes several critical and high severity flaws affecting Siveillance and Desigo building automation products. The security holes exist due to the use of a vulnerable version of a Gemalto license management system (LMS). The bugs [&#8230;]</p>
<p>The post <a href="https://www.icscybersecurityconference.com/critical-vulnerabilities-found-in-siemens-building-automation-telecontrol-products/">Critical Vulnerabilities Found in Siemens Building Automation, Telecontrol Products</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/critical-vulnerabilities-found-in-siemens-building-automation-telecontrol-products/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Bechtel Opens Industrial Cyber Security Lab</title>
		<link>https://www.icscybersecurityconference.com/bechtel-opens-industrial-cyber-security-lab/</link>
					<comments>https://www.icscybersecurityconference.com/bechtel-opens-industrial-cyber-security-lab/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Wed, 08 Mar 2017 01:20:56 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Bechtel]]></category>
		<category><![CDATA[ICS]]></category>
		<category><![CDATA[SCADA]]></category>
		<guid isPermaLink="false">http://www.icscybersecurityconference.com/?p=1451</guid>

					<description><![CDATA[<p>Global engineering and construction giant Bechtel has opened a new cyber security lab aimed at protecting industrial equipment and software that control facilities such as power plants, chemical plants, and other large-scale critical infrastructure operations.   With the goal of protecting industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems from cyber threats, Bechtel says the lab will leverage its experience designing and implementing National Institute of Standards and Technology Risk Management Framework (NIST-RMF) solutions for its [&#8230;]</p>
<p>The post <a href="https://www.icscybersecurityconference.com/bechtel-opens-industrial-cyber-security-lab/">Bechtel Opens Industrial Cyber Security Lab</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/bechtel-opens-industrial-cyber-security-lab/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Rockwell Automation Partners With Claroty on Industrial Network Security</title>
		<link>https://www.icscybersecurityconference.com/rockwell-automation-partneys-claroty-industrial-network-security/</link>
					<comments>https://www.icscybersecurityconference.com/rockwell-automation-partneys-claroty-industrial-network-security/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Wed, 08 Feb 2017 21:22:10 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Claroty]]></category>
		<category><![CDATA[ICS]]></category>
		<category><![CDATA[Rockwell Automation]]></category>
		<category><![CDATA[SCADA]]></category>
		<guid isPermaLink="false">http://www.icscybersecurityconference.com/?p=1440</guid>

					<description><![CDATA[<p>Rockwell Automation is teaming up with industrial cybersecurity startup Claroty to combine their security products and services into future, combined security offerings. Rockwell, an industrial automation giant with more than 22,000 employees, said that after a competitive review process it selected Claroty for its anomaly-detection software purpose built for industrial network security. Armed with $32 million in funding through Series A and a Series B rounds, Claroty exited stealth mode in September 2016 to announce a security platform designed to [&#8230;]</p>
<p>The post <a href="https://www.icscybersecurityconference.com/rockwell-automation-partneys-claroty-industrial-network-security/">Rockwell Automation Partners With Claroty on Industrial Network Security</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/rockwell-automation-partneys-claroty-industrial-network-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Exploring Risks of IT Network Breaches to Industrial Control Systems (ICS)</title>
		<link>https://www.icscybersecurityconference.com/critical-infrastructure-security-risks-posed-network-breaches/</link>
					<comments>https://www.icscybersecurityconference.com/critical-infrastructure-security-risks-posed-network-breaches/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Tue, 17 Jan 2017 20:42:59 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[ICS]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[networks]]></category>
		<category><![CDATA[OT]]></category>
		<category><![CDATA[SCADA]]></category>
		<guid isPermaLink="false">http://www.icscybersecurityconference.com/?p=1418</guid>

					<description><![CDATA[<p>(SecurityWeek / Eduard Kovacs) &#8211; There have been several incidents recently where a critical infrastructure organization’s IT systems were breached or became infected with malware. SecurityWeek has reached out to several ICS security experts to find out if these types of attacks are an indicator of a weak security posture, which could lead to control systems also getting hacked. Security incidents involving critical infrastructure organizations There are only a few publicly known examples of cyberattacks targeting an organization’s industrial control systems [&#8230;]</p>
<p>The post <a href="https://www.icscybersecurityconference.com/critical-infrastructure-security-risks-posed-network-breaches/">Exploring Risks of IT Network Breaches to Industrial Control Systems (ICS)</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/critical-infrastructure-security-risks-posed-network-breaches/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Kaspersky Launches Industrial Control Systems CERT</title>
		<link>https://www.icscybersecurityconference.com/kaspersky-launches-industrial-control-systems-cert/</link>
					<comments>https://www.icscybersecurityconference.com/kaspersky-launches-industrial-control-systems-cert/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Wed, 02 Nov 2016 13:28:30 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[ICS]]></category>
		<category><![CDATA[Kaspersky Lab]]></category>
		<category><![CDATA[SCADA]]></category>
		<guid isPermaLink="false">http://www.icscybersecurityconference.com/?p=1383</guid>

					<description><![CDATA[<p>Kaspersky Lab has launched a new global computer emergency response team (CERT) focusing on industrial control systems (ICS). Through the Kaspersky Lab ICS-CERT, the security firm wants to share its knowledge and experience in securing industrial systems and coordinate the exchange of information between stakeholders. Officially launched last month, the new initiative aims to provide information on the latest threats, vulnerabilities, security incidents, mitigation strategies, incident response, compliance and investigations. Since it’s a non-commercial project, the Kaspersky Lab ICS-CERT will offer [&#8230;]</p>
<p>The post <a href="https://www.icscybersecurityconference.com/kaspersky-launches-industrial-control-systems-cert/">Kaspersky Launches Industrial Control Systems CERT</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/kaspersky-launches-industrial-control-systems-cert/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Siemens Fixes Vulnerabilities in SIMATIC, License Manager Products</title>
		<link>https://www.icscybersecurityconference.com/siemens-patches-flaws-simatic-license-manager-products/</link>
					<comments>https://www.icscybersecurityconference.com/siemens-patches-flaws-simatic-license-manager-products/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Mon, 17 Oct 2016 12:57:47 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[SCADA]]></category>
		<category><![CDATA[SIMATIC]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">http://www.icscybersecurityconference.com/?p=1380</guid>

					<description><![CDATA[<p>(SecurityWeek) &#8211; Siemens has released software updates to address several vulnerabilities in its SIMATIC and Automation License Manager (ALM) products. According to advisories published last week by both ICS-CERT and Siemens, the ALM, which allows customers to centrally manage licenses for their Siemens products, is affected by three vulnerabilities. The security holes, including one rated high severity and one rated critical, were reported to the vendor by researchers from Kaspersky Lab’s critical infrastructure team. The critical vulnerability, tracked as CVE-2016-8565, [&#8230;]</p>
<p>The post <a href="https://www.icscybersecurityconference.com/siemens-patches-flaws-simatic-license-manager-products/">Siemens Fixes Vulnerabilities in SIMATIC, License Manager Products</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/siemens-patches-flaws-simatic-license-manager-products/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
