About

Conference

SecurityWeek’s ICS Cyber Security Conference is the conference where ICS users, ICS vendors, system security providers and government representatives meet to discuss the latest cyber-incidents, analyze their causes and cooperate on solutions.

<We_can_help/>

What are you looking for?

Image Alt
>>Industrial Cybersecurity Launchpad

Industrial Cybersecurity Launchpad (Free for Conference Attendees)

Navigating the complex world of industrial cybersecurity can be daunting for those new to the field. With emerging threats targeting Operational Technology (OT), there has never been a more critical time to understand and secure your industrial systems.

Geared towards newcomers but beneficial for all, these sessions cover everything from landscape overviews to emergency response protocols.

Whether you’re new to the field or looking to fill gaps in your existing knowledge, these Launchpad sessions will provide an overview of various elements of industrial cybersecurity. Equip yourself with the foundational tools and skills to secure your industrial systems in today’s ever-evolving cyber landscape. Join us for a full day of learning, practical exercises, and networking opportunities.

The Industrial Cybersecurity Launchpad workshop consists of eight (8) sessions that will help you take the next step towards becoming an industrial cybersecurity pro!

Agenda Overview:
  • The Evolving OT Security and Automation Landscape
  • You Too Can Secure OT
  • Policy Violations, Compromise, Cyber Attacks, Oh My!
  • How to Avoid a Collision with IT/OT Cybersecurity Convergence
  • How Nefarious Actors Are Hacking IoT, OT & Network Devices
  • Patch Management for OT
  • One Does Not Simply Design an ICS Cyber Exercise
  • So, You’ve Been Hit, Now What?
Workshop Content By Session:

The Evolving OT Security and Automation Landscape – This session will discuss how technologies that are currently being used within the IT Realm (SIEM, SOAR, ITSM, PAM/IAM, XDR, etc.) are driving OT organizations to embrace a unified approach to using these tools across an organization and the benefits and negative consequences to doing so. It will also address how these tools can help with the significant challenges being faced above and also how OT staff and resources can work in a more unified fashion with their IT counterparts in a positive way as opposed to a negative / confrontational way as we see currently in some organizations.

Lastly we will dive into the ways digital transformation and the growing emergence of devices such as software PLC’s and things being done by the OPC Foundation are driving change to the OT landscape.

You Too Can Secure OT –  Are you tired of hearing how ICS is “insecure by default”, but if you just buy this widget all your problems will go away? This session will enable traditional IT security people to get started securing their OT systems. This session briefly highlights the differences between OT and IT systems and then dive into a structured approach for managing OT security risk.

Policy Violations, Compromise, Cyber Attacks, Oh My! – This session will focus on the continuing attack-defend scenarios that industry faces and real solutions. Topics include:

  • Common corporate policy violations that you should care about and why this relates to cyber.
  • What is the most common indication of compromise that we see?
  • What are the cost more common cyberattacks and how to protect your networks from these attacks?
  • The most likely ways a hacker will gain access to your internal networks and how to mitigate the attack when it comes.
  • The most common ways to detect a hacker is on a network and why it’s a moving target

How to Avoid a Collision with IT/OT Cybersecurity Convergence  – IT OT both serve different roles and fulfill unique responsibilities within an organization. During this session we’ll walk through what makes these teams and organizations unique including differences in measurements, priorities, equipment lifecycles, to educational backgrounds, reporting hierarchy, and managerial accounting. We’ll also share strategies and approaches to bridge the differences between organizations and individuals. Walk away equipped to converge and collaborate on cybersecurity more, while colliding less.

As OT becomes increasingly connected partly through IT technology and resources, a new set of cybersecurity and ownership challenges arise. Both sides are unprepared for the threats that loom, and without a clear understanding and approach, a potential collision awaits.

How Nefarious Actors Are Hacking IoT, OT & Network Devices – An in-depth look at the strategies and techniques used by malicious actors to exploit IoT, OT, and network devices.

Why are nation-states like China, Russia, North Korea, and Iran have shifting their focus to xIoT attacks? Because they work. Military-grade xIoT hacking tools are in use, cybercrime for hire predicated on compromised xIoT devices has been monetized, and public and private organizations worldwide are already “pwned” without even knowing it. Nation-state actors are counting on you being passive by not mitigating xIoT security risks. They want you to fail so they can continue to evade detection and maintain persistence on your xIoT devices.

In this session, we will share stories from the trenches involving cybercriminals, nation-state actors, and defenders. He’ll detail findings from over six years of xIoT threat research spanning millions of production devices in enterprises and government agencies around the world. He’ll address specific threats from US adversaries like persistent xIoT malware (QuietExit), weaponized xIoT botnets (Fronton), a training platform for critical infrastructure attacks (Crystal-2V), an ICS exploitation framework (Pipedream), pre-installed malware in devices, drones, VoIP supply chain attacks and more. And finally, he’ll identify various steps organizations can take to mitigate risk while embracing a Things-connected world.

Patch Management for OT –  Struggling to wrap your arms around deploying a patch management strategy in OT and don’t know where to start? This session will help you learn about tools that are available to assist in your efforts, discover automated tools for inventory to vulnerability correlation and review patch management prioritization methodologies based upon industry standards and Guidelines.

So, You’ve Been Hit, Now What? – With many events of ransomware and other malware hitting Industrial control systems, are you ready to respond to the event? Other events may also result in the loss of operations at a facility, will you be able to recover? Are your people prepared?

Paying a ransom can be expensive and is not the real option. Time is money, without a carefully prepared Disaster Recovery Plan (DRP), how long will it take to recover? Days? Weeks? Months? There is a potential that without planning, training and preparation, recovery would not be possible without a very large investment.

This session will provide the basics and requirements of a DRP to ensure that you are ready to respond to the event and recover in the shortest possible time frame.

One Does Not Simply Design an ICS Cyber Exercise – Competitions, such as Capture the Flag (CTF) events and cyber exercises, are becoming increasingly important to help raise awareness of ICS and OT cybersecurity threats. These events also provide valuable opportunities for security professionals to learn new skills, test their existing skills, and collaborate with other professionals. Thus, it is important to build platforms to create realistic yet fun scenarios as learning opportunities in the OT space.

This session will explore the role of CTFs and cyber exercises in ICS and OT cybersecurity and how to design an effective ICS cyber exercise that provides a realistic environment.

Industrial Cybersecurity Launchpad Target Audience:

Entry-level cybersecurity professionals, IT/OT managers, industrial engineers, and anyone interested in understanding and protecting against threats in the OT environment.

Date: Monday, October 23, 2023 [9AM-3PM]
Workshop Registration Fee: Free for Conference Attendees

Limited seats available. Reserve your spot today!

Attendees should have basic knowledge of ICS networks, software, and components and