We received a large number of session proposals describing cyber-physical attacks on ICS. While I’m not crazy about that term, it’s good to see the emphasis on looking at the engineering and automation required to reach the end goal of affecting the...
A number of people I respect greatly kept telling me to get Jason Healey to speak at S4 about cyber statecraft, cyber war, China, economics of cyber, … He certainly has the bio for it with his experience as a Director for Cyber Policy at the White House, Vice...
Ralph Langner of The Langner Group has been a speaker or attendee at every S4 since it began in 2007. And we are pleased to announce he will be back speaking at S4x16. His topic is: Critical Penetration Analysis – Turning the Art of Identifying Plant-Level...
S4 began is 2007, and we have never had a DHS or INL leader on stage to provide an overview of their programs, results and plans. These are incredibly useful sessions at an event for those new to ICS, but for the experienced S4 audience they are primarily an...
The Main Stage at S4x16 is theater/concert size and quality, and it requires dynamic and interesting speakers and sessions … and we have an impressive lineup for you. A prime example is Mikko Hypponen who will be speaking on Cyber Geopolitics. Mikko will...
I attended and spoke at escar Asia (embedded security in cars) the last two days in Tokyo. Obviously the Miller/Valasek Jeep hack was referenced in almost every session and gave the event a sense of urgency. There were some very positive developments in the...
Who would have thought a podcast on insurance would be one of my favorite and most interesting I’ve done in the past few years. [powerpress] I spoke with Eireann Leverett and Jennifer Copic of the University of Cambridge Centre for Risk Studies. They were two of...
The best way to get the most of any conference is to be a speaker. At S4 you get a chance to present your great research or passionate viewpoint to an audience of advanced ICSsec pro’s who will get it. They might not agree, but they will get it. So check...
The Switches Get Stitches crew has been hard at work on quite a few switching projects. Indeed they released a new exploit tool against GE and GarrettCom switches early this morning, after attempting to get a fix for a Denial of Service bug for at least one year...
I tweeted on this OSIsoft self-disclosure last week: It’s huge that OSIsoft self reported these and even provided summary CVSS info. Continued leadership in ICSsec space https://t.co/YL3dYw3HxU— Dale Peterson (@digitalbond) August 14, 2015 But I want to write a...