4SICS - Stockholm International Summit on Cyber-Security in SCADA and Industrial Control Systems

Menu

4SICS Agenda 2016

  • 08.00 - 09.00 Registration
  • 09.00 Pre-summit Workshops/Tutorials
    • ICS Active Defence - Robert M. Lee
    • Shodan Hacking - John Matherly
    • Introduction to the IEC 62443 Standard - Arjan Meijer
  • 17.00 End of pre-summit Workshops/Tutorials
  • 18.00 Registration and Networking Reception Bar
  • Evening Presentations by 4SICS Premium Partners
  • 19.15 KIPS (Kaspersky Interactive Protection Simulation)
  • 22.00 End of Networking Reception
  • 08.00 - 09.00 Doors Open - Registration
  • 09.00 Opening of 4SICS Summit 2016
  • Keynote Exploring the Unkown ICS Threat Landscape Robert M. Lee
  • Coffee Break
  • Defence-in-Depth in a time of Advanced Persistent Threats Jens Zerbst
  • In a grid operator's security trenches Erwin Kooi
  • Lunch Break
  • PLC-Blaster - A Worm Living in Your PLC Maik Brüggeman
  • Embodied Vulnerabilities - How to find, fix, and think about them Marie Moe & Eireann Leverett
  • Coffee Break
  • Rise of the Machine John Matherly
  • Lightweight Protocol! Serious equipment! Critical implications! Lucas Lundgren
  • End of day one sessions - Break
  • 18.30 Dinner
  • Dinner Speaker Voyage to Space Christer Fuglesang
  • End of Evening Session
  • Lunch Break
  • Cybersecurity in Europe - the NIS Directive and the role of Operators of essential services Rosella Mattioli & Paraskevi Kasse
  • Too many cooks spoil the broth? Isabel Skierka & Jan-Peter Kleinhans
  • Panel Discussion Panel about regulations, NIS-directive etc
  • Coffee Break
  • ENISA open session
  • 15.30 Overview ENISA studies and effort in ICS SCADA
  • 16.00 Overview ENISA studies and effort in smart infrastructure and IoT
  • 16.45 Open Panel: IoT and ICS SCADA, industry 4.0 and industrial IoT and smart industry, what are the scenarios?
  • 09.00 Intro day two of 4SICS Summit 2016
  • DYODE: Do Your Own DiodE Ary Kokos & Arnaud Soullié
  • Coffee Break
  • Physics-based attack detection and countermeasures in control systems Henrik Sandberg
  • Ageing of ICS - What's the Deal? Vidar Hedtjärn Swaling
  • The role of anomaly detection in industrial control systems Simin Nadjm-Tehrani
  • Lunch Break
  • CRATE City - Illustrate the real world consequences of a simulated cyber attack Erik Westring & Peter Andersson
  • Breaking isolation using cache attributes Roberto Guanciale
  • Coffee Break
  • The Ukraine Cyber Attack: One Year Later Robert M. Lee
  • BlackEnergy - What We Really Know About the Notorious Cyber-Attacks Anton Cherepanov & Robert Lipovsky
  • Panel Discussion Lessions learned by the Ukraine Attack
  • Round Up 4SICS 2016 Erik Johansson & Robert Malmgren
  • 17.00 The End
  • CERT Session
  • Road to Cyber Threat Intelligence in the Energy Sector Margrete Raaum & Thomas Schreck
  • Building Robust Tabletop Exercises to Strengthen Your CSIRT Ken van Wyk
  • Coffee Break
  • The Cyber Threat Intelligence Matrix: A simple incident response decision model Frode Hommedal
  • Lunch Break