Industrial Control Systems

Af7244bb99debb4a1152fa49a993a05c

Preview: SecurityWeek's 2016 ICS/SCADA Cyber Security Conference – Oct. 24-27

October 18, 2016 Added by:Eduard Kovacs

Security professionals from various industries will gather next week at the 2016 edition of SecurityWeek’s ICS Cyber Security Conference, the longest-running event of its kind. The conference takes place on October 24-27 at the Georgia Tech Hotel & Conference Center in Atlanta, Georgia.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Demonstration of Hacking a Protective Relay and Taking Control of a Motor

September 15, 2016 Added by:Joe Weiss

At the 2016 ICS Cyber Security Conference we will be providing a demonstration and will take the SEL-751A used in a traditional motor control setting and compromise not only the SEL751A, but then take control of the motor.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Ukranian Electric Grid Cyber Attack – It Can it Happen Here Too

January 09, 2016 Added by:Joe Weiss

As the NERC CIP process is public, our enemies are aware of the gaping cyber holes in our electric systems. When will the responsible entities wake up or will it be after they can’t turn their lights on?

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

BlackEnergy Malware Used in Ukraine Power Grid Attacks: Report

January 05, 2016 Added by:Eduard Kovacs

Security firm ESET has been monitoring attacks involving the threat and recently discovered that the Trojan had been used to target news media and electrical power companies in Ukraine.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

US Critical Infrastructures are Being Targeted by Actors in the Middle East – But Attribution is Difficult

November 19, 2015 Added by:Joe Weiss

The availability of ICS cyber exploits, and the lack of attribution, there should be more concern about the very viable cyber threat to our critical infrastructures.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Observations From the 2015 ICS Cyber Security Conference

November 10, 2015 Added by:Joe Weiss

2015 ICS Cyber Security Conference – Neither the Grid, Nuclear Plants, or other Undustries are Cyber Secure

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Boards Must Understand the Risks from Industrial Control Systems (ICS) Cyber Security

October 12, 2015 Added by:Joe Weiss

The Boards of Directors function is to identify and judge risk to the organization. As one member of a utility board stated, “A Board needs to know what the company is exposed to in terms of risk and what the consequences are of that exposure. Given a specific security deployment protecting an asset – what possibilities exist for breach?

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

The 2015 ICS Cyber Security Conference

September 18, 2015 Added by:Joe Weiss

The 2015 ICS Cyber Security Conference will be October 26-29 at the Georgia Tech Hotel and Conference Center in Atlanta (www.icscybersecurityconference.com ). This will be the 15th in a series that began in 2002. The Conference will have some new twists, but will also stay true to its roots - ICS cyber security and what makes ICS cyber security different. Specifically, there will be....

Comments  (0)

E1dfbe313b63976d1d9cdf7c31b343f3

SCADA Systems Offered for Sale in the Underground Economy

June 22, 2015 Added by:Idan Aharoni

Access to such compromised SCADA systems that control various real-world equipment is being sold in the underground economy.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Preview: Suits and Spooks London - May 6-7, 2015

April 16, 2015 Added by:Eduard Kovacs

With less than three weeks to go until Suits and Spooks London 2015 kicks off, the agenda is nearly finalized. Our first 2-day international event will host experts in cyber warfare, intelligence, advanced persistent threats, sophisticated malware, and political issues.

Comments  (0)

306708aaf995cf6a77d3083885b60907

Suits and Spooks DC 2015: The Agenda - Last Chance to Register

January 29, 2015 Added by:Mike Lennon

Suits and Spooks DC is less than one week away! The event will be held at the Ritz-Carlton, Pentagon City on February 4-5. Due to multiple sell-out events, we have expanded our attendee capacity to 200, but the event is again close to being sold out.

Comments  (2)

279d808ff27c98d0dff8c5f1e8a19a8e

The Security Industry and a Look Ahead

December 03, 2014 Added by:Art Coviello

I am cautiously optimistic about the prospects for collaboration and collective progress in the private sector as companies and industries are recognizing that in the digital world, no one is an island. We’re more like an archipelago and we’re starting to build bridges.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

First Victims of the Stuxnet Worm Revealed

November 11, 2014 Added by:InfosecIsland News

Kaspersky Lab today announced that after analyzing more than 2,000 Stuxnet files collected over a two-year period, it can identify the first victims of the Stuxnet worm.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

The Chinese Truly are Attacking our Critical Infrastructure

October 17, 2014 Added by:Joe Weiss

Bob Radvanovsky from Infracritical took a similar approach and the results are astounding. He acquired some Ruggedom switches from E-Bay and set up a network emulating a well pumping station. Within 2 hours of connecting the systems, he was being attacked primarily from China.

Comments  (0)

306708aaf995cf6a77d3083885b60907

Interactive Agenda: 2014 ICS Cyber Security Conference

October 08, 2014 Added by:Mike Lennon

We are happy to unveil the Interactive Agenda for the 2014 ICS Cyber Security Conference! After a sell-out conference in 2013, be sure to Register Now and confirm your spot for this year’s event!

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Unintentional ICS Cyber Incidents Have Had Significant Impacts on Nuclear Plants – Why Aren’t they Being Addressed?

October 02, 2014 Added by:Joe Weiss

The NIST definition of a cyber incident as defined in FIPS PUB 200, Minimum Security Requirements for Federal Information and Information System, is electronic communications between systems or systems and people that impacts Confidentiality, Integrity, and/or Availability. The incident doesn’t have to bemalicious or targeted to be a cyber incident

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »