RSA Conference conducts information security events around the globe that connect you to industry leaders and highly relevant information. RSA also delivers, on a regular basis, insights via blogs, webcasts, newsletters and more so you can stay ahead of cyber threats.
CyberX invites you to a ½ day seminar, where you will network with your peers and hear CISOs and executives from leading organizations in the electricity, pharmaceutical and manufacturing sectors, share their experiences, challenges and what path they took to maximize operational resilience. Mo Ahddoud, CISO, Scotia Gas Networks will talk about “How to converge IT and OT security and live to tell”, and Mr. Ilan Abadi, Vice President & Global CISO of Teva Pharmaceutical Industries will deliver the keynote.
The 2018 Gartner Security & Risk Management Summit agenda features five comprehensive programs to cover your security and risk management key priorities and challenges. At the conference you’ll learn how to take a strategic approach to risk, improve business and data resilience, build digital trust and implement a new generation of continuously adaptive security strategies.
The 3rd edition of the Manusec Summit will bridge the gap between the process control and corporate IT senior level professionals, allowing them to discuss challenges, critical issues and debate best practice guidelines
NERC’s annual Grid Security Conference (GridSecCon) series brings together cyber security and physical security experts from industry and government to share emerging security trends, policy advancements, and lessons learned related to the electricity industry. The first conference was held in New Orleans in October 2011, and has rotated through the NERC Regional Entities across North America.
Produced by SecurityWeek, the ICS Cyber Security Conference is the conference where ICS users, ICS vendors, system security providers and government representatives meet to discuss the latest cyber-incidents, analyze their causes and cooperate on solutions. Since its first edition in 2002, the conference has attracted a continually rising interest as both the stakes of critical infrastructure protection and the distinctiveness of securing ICSs become increasingly apparent.
In this educational SANS webinar led by Justin Searle, Director of ICS Security at InGuardians and a senior SANS instructor since 2011, and Phil Neray, VP of Industrial Cybersecurity at CyberX, the ICS security company founded by military cyber experts with nation-state expertise defending critical infrastructure, you’ll learn about:
- The technical architecture of the TRITON malware
- Threat models showing how the attackers could have compromised the engineering workstation
- How to implement a multi-layered active defense to defend against similar attacks in the future
The annual ICS Security Summit brings together in-the-field practitioners and leading experts to share ideas, methods, and techniques for defending control systems. This year’s SANS ICS Security Summit focuses on the theme “Who is in control of your control system?” In-depth presentations and interactive panel discussions will highlight real-world approaches that work and make a difference for the individuals fighting this fight every day. As an attendee, you’ll walk away with actionable information that you can use to better secure your organization.
CyberX and the Security Interest Group Switzerland (SIGS) cordially invite you to an educational ½-day seminar about “Emerging ICS/SCADA Security Threats — and How to Maximize Operational Resilience.”
This event is an opportunity for participants to network with their peers and share best practices for protecting ICS/SCADA networks from these new and emerging threats.
Now in its 11th edition, the Cyber Security for Critical Assets Summit (USA) boasts a dynamic double-stream agenda alongside opportunities to participate in practical exercises though an exclusive cybersecurity workshop.
Now in its 11th year, the main S4 Conference in Miami Beach will have 300+ attendees watching 3 days of sessions on 3 stages. It is the one show where advanced ICS security, OT and IIoT content can be presented to an audience that will get it.
In this educational webinar led by Doug Wylie, SANS Director of the Industrials & Infrastructure practice area and previously Director of Product Security and Risk Management at Rockwell Automation, with Phil Neray, VP of Industrial Cybersecurity at CyberX, we’ll explore the following questions:
- Blending IT, OT and IIoT Security in the Corporate SOC: Given the massive investment organizations have already made in centralized SOCs in trained personnel, standardized workflows, and unifying technologies such as SIEMs is it time to bring ICS security into the corporate SOC?
- Addressing the culture gap: How do we encourage tighter collaboration between IT security and OT teams?
- Funding models: Who pays for stronger ICS security?
Join David Atch, VP Research at CyberX for his presentation Exfiltrating Reconnaissance Data from Air-Gapped ICS/SCADA Networks at Black Hat Europe 2017 on either December 6 or 7.
View the full briefing abstract here
Join us at the 12th Annual API Cybersecurity Conference & Expo and discover methods for thwarting the bad guys, what the scene looks like over the horizon and how the latest technologies can help you counter cyber espionage, address cyber warfare, and make your cyber efforts secure.
SecurityWeek’s Industrial Control Systems (ICS) Cyber Security Conference is the largest and longest-running event series focused on industrial cybersecurity. Since 2002, the conference has gathered ICS cyber security stakeholders across various industries and attracts operations and control engineers, IT, government, vendors and academics.
NERC’s annual Grid Security Conference (GridSecCon) series brings together cybersecurity and physical security experts from industry and government to share emerging security trends, policy advancements, and lessons learned related to the electricity sub-sector. The first conference was held in New Orleans in October 2011, and has rotated through the NERC Regional Entities across North America The conference objectives include:
Do you know of an event you think CyberX should attend?
Visit our Contact Us page and let us know
Securing the OT Network to Maintain Productivity
Designed as a situational-aware platform, XSense seamlessly connects to an existing setup and begins to model the network like a state machine. Acting as an invisible layer, XSense shows results within minutes by collecting data from around the OT Network and utilizing Big Data and Machine Learning to better understand the its operational behavior.
Understanding how the network operates and when it changes, assures detection of unfamiliar activity, be it a cyber-attack, an operational malfunction or a tampering incident. In addition, running forensics on traffic, which was collected by XSense, provides visibility and insight into both operational and security events in the OT Network.
Complete Visibility and Real-Time Alerting
Real-Time Operational and Cyber Incident Alerts
- Immediate and complete visibility into the operational network
- Alerts about existing operational and cyber threats
- Maintain productivity and business continuity
- On-going machine learning process
Active Machine Learning and Modeling
- Continuous learning of the operational network
- Adapting to changes within the network
- Real-time detection of operational and cyber threats
- Rapid incident identification and alerting
- Lowering risk of downtime
- Facilitating administration
- No interruption to operation (plug and play)
- Operates within minutes of the installation
- No overhead, pre-requisites or additional investments