Industrial Control Systems

Ffc4103a877b409fd8d6da8f854f617e

First Victims of the Stuxnet Worm Revealed

November 11, 2014 Added by:InfosecIsland News

Kaspersky Lab today announced that after analyzing more than 2,000 Stuxnet files collected over a two-year period, it can identify the first victims of the Stuxnet worm.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

The Chinese Truly are Attacking our Critical Infrastructure

October 17, 2014 Added by:Joe Weiss

Bob Radvanovsky from Infracritical took a similar approach and the results are astounding. He acquired some Ruggedom switches from E-Bay and set up a network emulating a well pumping station. Within 2 hours of connecting the systems, he was being attacked primarily from China.

Comments  (0)

306708aaf995cf6a77d3083885b60907

Interactive Agenda: 2014 ICS Cyber Security Conference

October 08, 2014 Added by:Mike Lennon

We are happy to unveil the Interactive Agenda for the 2014 ICS Cyber Security Conference! After a sell-out conference in 2013, be sure to Register Now and confirm your spot for this year’s event!

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Unintentional ICS Cyber Incidents Have Had Significant Impacts on Nuclear Plants – Why Aren’t they Being Addressed?

October 02, 2014 Added by:Joe Weiss

The NIST definition of a cyber incident as defined in FIPS PUB 200, Minimum Security Requirements for Federal Information and Information System, is electronic communications between systems or systems and people that impacts Confidentiality, Integrity, and/or Availability. The incident doesn’t have to bemalicious or targeted to be a cyber incident

Comments  (0)

457ad4752923de991424e3d0f5a6abb6

Shining a Light on Industrial Control Networks with Purpose Built Intrusion Detection Systems

September 16, 2014 Added by:Nate Kube

There are differences between industrial control systems and enterprise IT networks resulting in different security needs. To protect industrial networks, system operators must opt for an industrial next gen firewall with an IDS that fully understands industrial protocols and the specific context of each industrial command.

Comments  (0)

66b2dbdbe2e68ab8e51b5af3d6e360ae

Collective Self-defense: What Japan’s New Defense Policy Means for International Cooperation on Cyber Security

September 04, 2014 Added by:Mihoko Matsubara

Joint exercises are key to making joint operations seamless and increasing the capability of cyber defenses. The Japanese and US governments have committed themselves to revise the US–Japan Defense Cooperation Guidelines by the end of this year and to include bilateral cooperation on cyber security in the revision.

Comments  (0)

306708aaf995cf6a77d3083885b60907

Save $300 on ICS Cyber Security Conference Registration

August 21, 2014 Added by:Mike Lennon

Attendees who register by Friday, August 22 will Save $300 and pay just $1695 for a full conference registration which includes 4 days and pre-conference workshops.

Comments  (1)

306708aaf995cf6a77d3083885b60907

2014 ICS Cyber Security Conference Agenda Update

August 15, 2014 Added by:Mike Lennon

The 14th ICS Cyber Security Conference will have 5 major themes: Actual ICS cyber incidents; ICS cyber security standards; ICS cyber security solutions; ICS cyber security demonstrations; and ICS policy issues.

Comments  (0)

682e0e796084e163c5ca053dd8573b0c

Is BYOD Security Really Concerned with Safety – or Is It About Control?

July 14, 2014 Added by:Eric Byres

As SCADA security professionals we need to pick our security battles carefully. I will be looking deeper into the real goals of any SCADA security policy or technology I am exposed to. Is it really helping make SCADA and ICS safer? Or is it just a way to make control easier? Is it addressing the real risks? Or is it just for show?

Comments  (0)

306708aaf995cf6a77d3083885b60907

2014 ICS Cyber Security Conference Opens Call for Papers

July 10, 2014 Added by:Mike Lennon

SecurityWeek today announced the official Call for Papers for the 2014 Industrial Control Systems (ICS) Cyber Security Conference, to be held October 20 – 23, 2014 at the Georgia Tech Hotel and Conference Center in Atlanta, Georgia.

Comments  (0)

306708aaf995cf6a77d3083885b60907

DHS Mistakenly Releases 840-pages of Critical Infrastructure Documents

July 09, 2014 Added by:Mike Lennon

The U.S. Department of Homeland Security (DHS) has released hundreds of documents, some of which contain sensitive information and potentially vulnerable critical infrastructure points across the United States, in response to a recent Freedom of Information Act (FOIA) request about a cyber-security attack.

Comments  (0)

306708aaf995cf6a77d3083885b60907

2014 ICS Cyber Security Conference to Take Place October 20-23 in Atlanta

July 07, 2014 Added by:Mike Lennon

The 2014 ICS Cybersecurity Conference will be held October 20 – 23, 2014 at the Georgia Tech Hotel and Conference Center in Atlanta, Georgia, USA.

Comments  (0)

306708aaf995cf6a77d3083885b60907

Last Chance to Register for Suits and Spooks New York

June 18, 2014 Added by:Mike Lennon

Suits and Spooks NYC will feature over 20 expert speakers in the areas of financial intelligence, special operations, information security, money laundering, and the protection of critical infrastructure.

Comments  (4)

201d6e4b7cd0350a1a9ef6e856e28341

2014 ICS Cyber Security Conference – Mark Your Calendar

June 02, 2014 Added by:Joe Weiss

It's official! The 2014 (the 14th) ICS Cyber Security Conference will be held October 20 – 23, 2014 at the Georgia Tech Hotel and Conference Center in Atlanta.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

SecurityWeek Acquires Industrial Control System Cybersecurity Conference Series

April 28, 2014 Added by:InfosecIsland News

SecurityWeek announced that it has acquired the ICS Cybersecurity Conference series, the leading organizer of cybersecurity-focused events for the industrial control systems sector.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

A Wake-up Call to Ignoring Cyber Threats – PG&E Indicted on Criminal Charges

April 07, 2014 Added by:Joe Weiss

On April 1, a federal grand jury indicted PG&E on 12 counts of knowingly and willfully violating the federal Pipeline Safety Act leading to the San Bruno natural gas pipeline rupture.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »