Loading…
This event has ended. Visit the official site or create your own event on Sched.
Welcome to the interactive agenda for SecurityWeek’s ICS 2022 ICS Cyber Security Conference. Sessions are being finalized and the final program will include 4 FULL DAYS of content. (View the full conference website here) (You can Register for the IN-PERSON Conference and trainings here and register for virtual/online only access here)
Training [clear filter]
Monday, October 24
 

8:00am EDT

Monday - Pre-Conference Training & Workshop Day
Monday October 24, 2022 8:00am - 5:00pm EDT

9:00am EDT

Applied ICS Security Training Lab
This full-day lab course gives participants hands-on experience attacking and hardening a simulated power plant network to learn about common ICS vulnerabilities and defenses. Participants will attack historians, HMIs, and PLCs to cause a power outage in the 3D simulation, and then implement defenses like firewalls and network monitoring to harden it.

Learning Objectives - In this session attendees will learn:
  • Deeper understanding of common vulnerabilities in ICS networks and devices                     
  • Techniques for testing ICS devices for various vulnerabilities
  • Practical experience hardening ICS device configurations and using network defenses

Topics Covered:
  • Scanning ICS networks
  • Exploiting web vulnerabilities in the DMZ
  • Sniffing industrial network traffic
  • Password cracking
  • PLC and HMI programming
  • Using Yara to scan for ICS malware
  • Writing host and network firewall rules for ICS
  • ICS network intrusion detection
                               
Requirements
Participants must bring their own laptop with either Chrome or Firefox installed. Some Linux experience is helpful but not required.

Speakers
avatar for Dr. David Formby

Dr. David Formby

Fortiphyd Logic, CEO/CTO
David Formby is CEO/CTO and co-founder of Fortiphyd Logic. He received his Ph.D. from the Georgia Institute of Technology where he focused on developing novel attacks and defenses for industrial control system networks and PLCs. Formby now leads Fortiphyd Logic in developing innovative... Read More →


Monday October 24, 2022 9:00am - 5:00pm EDT
Trippe II

9:00am EDT

Attacking ICS With Python
(Register) This 8-hour workshop will be a crash course in ICS vulnerabilities and exploitation, providing hands-on, practical training in the carrying out of attacks against various common types of ICS equipment found in the field, including an HMI, PLC and automated circuit breaker. Students will learn:
  • Common ICS terminology and system architecture, including inherent flaws and typical mistakes made in system design which should be considered when planning an attack. 
  • Modbus and Modbus/TCP architecture and functionality
  • Python modules for interacting with Modbus-based systems, and writing scripts to interrogate and attack these systems
  • Defensive methodologies and considerations in the face of how simple these attacks can be to carry out
Students should come prepared with the following equipment and knowledge: 
  • A laptop running either Virtualbox, VMWare Workstation (not Player), Parallels, or VMWare Fusion
  • An available Ethernet port on the laptop
  • Ability to read technical documents written in English
  • Experience writing basic Python scripts which incorporate modules and leverage functions and loops
  • Basic Linux command line experience, including the ability to navigate directories, and launch application
Register Here

Speakers
avatar for Antonio “Johnny” Martinelli

Antonio “Johnny” Martinelli

Director of Training, GRIMM
Johnny is a predominant personality in the Information Security community and is currently the Director of Cybersecurity Training with the Grimm Security Engineering firm. He is most well-known for his work on the American TSA Master Key leaks between 2014 and 2018 and the Venmo public... Read More →
avatar for Cole Smith

Cole Smith

GRIMM
After finishing his Bachelor's in Cybersecurity at George Washington University, ColeSmith started as a Junior Cyber Physical Engineer at GRIMM. Prior to that, he spent four years in the United States Marine Corps working with field utilities as an electrician/generator mechanic... Read More →


Monday October 24, 2022 9:00am - 5:00pm EDT
Hope II

9:00am EDT

OT Cybersecurity Red Team/Blue Team Workshop
(Additional Registration Required - $495 Fee: Register ) This workshop will provide students of any role or skill level (beginners, advanced, and leadership) an immersive and entertaining OT cybersecurity learning experience, by participating as part of a blue team and a red team in a simulated environment. Short lectures cover Red Team topics (OT vulnerabilities, OT attack surface, and “hacker” methods) and Blue Team topics (OT vulnerabilities, security controls, threat monitoring, cyber risk management strategies, incident response, building a cybersecurity program). These topics are then exercised and reinforced in breakout sessions, where students get to compete against each other in “head-to-head” red team vs. blue team matches using the ThreatGEN® Red vs. Blue Cybersecurity Simulation Platform.

What will you get out of this course?
  • Gain a comprehensive, “big picture” understanding of how all the OT cybersecurity pieces work together.
  • A primer/refresher of Industrial Control Systems (ICS)/Operational Technology (OT)
  • Learn OT vulnerabilities and attack vectors
  • Learn about the methods and strategies red teams and hackers use to attack OT (High-level, this is not a command line level course)
  • Learn OT and cyber risk management concepts and strategies
  • Learn how to deploy efficient and cost-effective cyber risk mitigation strategies and security controls
  • Learn how to build a complete OT cyber security program.
  • Apply what you’ve learned against live adversaries (going head-to-head against other students) in the ThreatGEN® Red vs. Blue Cybersecurity Simulation Platform
  • Learn how to respond to, adapt, and defend against active attacks (High-level, this is not a technical incident response or threat hunting class.)
  • Participate as the blue team and the red team (no prior experience or technical skill required).
  • Taught by Clint Bodungen, world-renowned ICS cybersecurity expert and author of Hacking Exposed: Industrial Control Systems
Requirements
Participants must bring their own laptop with either Chrome, Firefox, or Microsoft Edge installed. Connection to the internet will be required (access provided by the conference). Nothing will be installed onto your laptop.

Speakers
avatar for Clint Bodungen

Clint Bodungen

President & CEO, ThreatGEN
Clint is a recognized industrial cybersecurity expert, public speaker, and lead author of the book “Hacking Exposed: Industrial Control Systems”. He is a United States Air Force veteran, has been an INFOSEC (now called “cybersecurity”) professional for more than 20 years... Read More →


Monday October 24, 2022 9:00am - 5:00pm EDT
Trippe I

3:30pm EDT

ICS4ICS Exercise
Open to all conference attendees (no additional fee)

ICS4ICS Exercises are designed to help people understand how ICS4ICS processes and tools are used to improve the response to industrial control system cybersecurity incidents by leverage FEMA and DHS CISA capabilities.

Be part and join the Incident Command System for Industrial Control Systems (ICS4ICS) Exercise at SecurityWeek's ICS Cybersecurity Conference! The ISA Global Cybersecurity Alliance has joined forces with DHS Cybersecurity and Infrastructure Security Agency (CISA) and cybersecurity response teams from more than 50 participating companies to adopt FEMA's Incident Command System framework for response structure, roles, and interoperability. This is the system used by First Responders globally when responding to hurricanes, floods, earthquakes, industrial accidents, and other high impact situations. The ICS4ICS program is designed to improve cybersecurity capabilities related to incidents that impact industrial control systems and critical infrastructure supporting countries throughout the world.

Access ICS4ICS Materials

Monday October 24, 2022 3:30pm - 5:30pm EDT
Hope III
 
Tuesday, October 25
 

8:00am EDT

Capture the Flag (CTF) Opens
(Click Here to Register for CTF)

Roll up your sleeves and get ready for some fun and challenges for the 2022 ICS Cybersecurity Conference Capture the Flag (CTF) hacking competition! Competition rules and setup details will be available prior to the conference.

Hack the Plan[e]t is a first-of-its-kind CTF: a slice of modern city life integrating both Internet of Things (IoT) and ICS environments with interactive components for competitors to test their skills and knowledge. Play for a few minutes or plan to stay for many hours as the challenge grows. The ICS Village delivers a compelling experience using real IT and industrial equipment for all skill levels and practitioner types. Open to all levels of experience.

Speakers
avatar for Dillon Lee

Dillon Lee

Volunteer, ICS Village
Dillon volunteers for ICS Village and works at Dragos as a Senior Technical Account Manager. Throughout the year he volunteers for ICS Village to increase public’s awareness of the need OT systems have for cybersecurity with interactive learning like CTF, TTX, and interactive demos... Read More →


Tuesday October 25, 2022 8:00am - Thursday October 27, 2022 1:00pm EDT
Hope I-III

4:00pm EDT

ICS Tabletop Exercise (TTX) - All Aboard the Runaway Train: Riding the Train that Couldn’t
Train control systems manage various things, from physical breaking to wayside switching control to railway congestion management. This tabletop exercise will take you on a journey through a compromised train scenario. All are welcome to come, share their experiences, and gain fantastic cyber-physical knowledge.

Note: Participants are required to utilize their own laptops

Tuesday October 25, 2022 4:00pm - 5:00pm EDT
Hope I-III
 
Wednesday, October 26
 

4:00pm EDT

ICS Tabletop Exercise (TTX) - All Aboard the Runaway Train: Riding the Train that Couldn’t
{This a re-run of the same TTX session that was held on Wednesday to accommodate those who could not attend the previous session}

Train control systems manage various things, from physical breaking to wayside switching control to railway congestion management. This tabletop exercise will take you on a journey through a compromised train scenario. All are welcome to come, share their experiences, and gain fantastic cyber-physical knowledge.

Note: Participants are required to utilize their own laptops
*Capacity Limited - First come, first served 

Wednesday October 26, 2022 4:00pm - 5:00pm EDT
Hope I-III
 
Filter sessions
Apply filters to sessions.