Cyber Security Events

Join CyberX at the following cyber security events and webinars throughout the year.

Event Details

Event Description

Upcoming Events

BlackHat USA 2017

Location: Innovation City Booth #IC58, Las Vegas, NV

Now in its 20th year, Black Hat is the world’s leading information security event, providing attendees with the very latest in research, development and trends. Black Hat USA 2017 kicks off with four days of technical Trainings (July 22-25) followed by the two-day main conference (July 26-27) featuring Briefings, Arsenal, Business Hall, and more.

Get up to speed fast on ICS security! Join us on Wednesday, July 26 at 3pm PT for a book giveaway and signing with Clint Bodungen, lead author of ICS Hacking Exposed, the definitive 390-page guide published by McGraw-Hill (while supplies last). Come to booth #58 in Innovation City (2nd floor near Arsenal tools demo area).

13th Annual Security & Compliance Summit

Location: Disneyland Hotel, 1150 West Magic Way, Anaheim, CA

The EnergySec Security and Compliance Summit is returning to Disneyland, August 14-16, 2017, for our best event ever! The Summit will include the events you love, including honoring the Energy Sector’s Cyber Security Professional of the Year and Security Leader of the Year. There will also be an expanded Vendor Expo this year featuring up to 25 of the leading product and service vendors serving our industry.

Join CyberX VP Sales Jim Blaschke for his presentation “Predicting the Next Industroyer / CrashOverride and Preventing Targeted Attacks on OT Networks – In Advance” on Tuesday August 15th at 11:30AM in the Magic Kingdom Ballroom. See Agenda

New Threat Vectors for ICS/SCADA Networks

Time: 13:30

Location: Home House, 20 Portman Sq, London, UK

CyberX would like to cordially invite you to a 1/2-day seminar, “New Threat Vectors for ICS/SCADA Networks”, featuring ICS experts from different industries including: pharmaceutical, nuclear, manufacturing and more.

The seminar will present an opportunity to meet with your peers and provide practical advice about assessing ICS cyber risk and protecting ICS infrastructures.

European Utility Week 2017

Location: Amsterdam, The Netherlands

European Utility Week is the meeting place for the entire smart energy community from utilities, network operators, vendors, large energy consumers, consultants, startups and system integrators covering every facet of the smart energy value chain.

ICS Cyber Security Conference 2017

Location: Intercontinental Buckhead, 3315 Peachtree Rd, Atlanta, GA

SecurityWeek’s Industrial Control Systems (ICS) Cyber Security Conference is the largest and longest-running event series focused on industrial cybersecurity. Since 2002, the conference has gathered ICS cyber security stakeholders across various industries and attracts operations and control engineers, IT, government, vendors and academics.

Past Events

Webinar: New Threat Vectors for ICS/SCADA Networks — and How to Prepare for Them

Time: 1:00PM

Location: SANS.org

Join us for an educational SANS webinar featuring Mike Assante, SANS lead for ICS/SCADA security. We’ll explore how to:
• Evaluate ICS risk from cybercriminals, competitors, and hacktivists.
• Engage with business leaders and OT personnel to help them understand the threats — and allocate resources to defend against them.
• Implement new risk-based controls beyond patching including asset discovery, continuous monitoring, and behavioral-based anomaly detection.

Telekom Congress Magenta Security 2017

Location: International Convention Center, Munich, Germany

At Telekom Congress Magenta Security 2017, you can look forward to exciting keynote speeches, networking formats, and breathtaking demonstrations of red hot security topics. The second Telekom Magenta Security Congress will take place on June 20 and 21, 2017 at the ICM/Messe München.

Join Nir Giller, CyberX Co-Founder and CTO for “Industrial Cybersecurity – The Blue-Screen-of-Death From a New Perspective” on June 20 from 14:40 – 15:20.

Gartner Security & Risk Management Summit

Location: National Harbor, MD

The premier gathering of security, risk management and business continuity management leaders,
Gartner Security & Risk Management Summit 2017 delivers the insight you need to guide your organization to a secure digital business future.

It’s a unique opportunity to reinvent your approach to security and risk for the digital age, based on Gartner’s trusted independent research and practical recommendations.

Houston CISO Executive Summit

Location: Westin Galleria, Houston, TX

The Houston CISO Executive Summit is our opportunity to strengthen our networks, our knowledge and our expertise. Built by CISOs, for CISOs, this invitation-only conference offers dynamic speakers and a chance to collaborate to better face current and future threats.

We’ll share insights and best practices on the industry’s hottest topics — including threat intelligence, security awareness, IT risk management and the expanding threat landscape.

Best Practices for Industrial Cybersecurity

Time: 13:00 - 18:00

Location: Zurich, Switzerland

CyberX and the Security Interest Group Switzerland (SIGS) cordially invite you to a seminar about ”Best Practices for Industrial Cybersecurity.”

Featuring ICS experts from SwissGrid, LafargeHolcim, Deutsche-Telekom, KPMG and CyberX, the seminar will provide practical advice and an opportunity to meet with your peers about assessing ICS cyber risk and protecting ICS infrastructures.

IT Security UK Strategy Meeting

Location: The Cumberland Hotel, London, UK

Join us in London for the IT Security UK Strategy Meeting. As one former attendee put it, it’s a “great experience for meeting vendors. Valuable way to expand knowledge and attain new contacts”.

SANS Webinar on “ICS Hacking Exposed”

Time: 11:00AM

Location: SANS.org

This educational webinar will provide an in-depth discussion of risk assessment and threat modeling for industrial networks. Featuring the lead author of “ICS Hacking Exposed,” the webinar will cover key topics from the book including ICS terminology; ICS risk assessment frameworks; examples of ICS vulnerabilities, threats and consequences; and how to use threat modeling to turn ICS threat information into actionable threat intelligence.

ICS Security Summit & Training – Orlando

Time: 11:00 - 11:45AM

Location: Wyndham Garden Lake Buena Vista Disney Springs Resort, 1850B Hotel Plaza Boulevard, Orlando, FL

Operation BugDrop – Stage 1 Cyber-Reconnaissance in the Real-World

In February 2017, CyberX’s threat intelligence research team discovered a massive cyber-reconnaissance operation targeting critical infrastructure, scientific research and media in the Ukraine and other countries. The operation requires a massive back-end infrastructure to store, decrypt and analyze several Gigabytes per day of unstructured data that’s captured from its targets (including audio recordings, screen shots, documents and passwords). In this session, CyberX’s VP of Research will describe how their team discovered the malicious operation, reverse engineered the malware, and dissected its C&C mechanisms; as well as provide recommendations on how to protect your ICS infrastructure from these types of cyber-intrusions.

Presented by David Atch, VP of Research, CyberX

RSA Conference 2017

Location: See us in the Israeli Export Institute booth (South Hall, #S833), Moscone Center, San Francisco, CA

RSA Conference’s mission is to connect you with the people and insights that will empower you to stay ahead of cyber threats. We do this through our events in the US, the EMEA region and the Asia-Pacific region and through our digital outreach. However you access our community, RSA Conference is your best resource for exchanging ideas, learning the latest trends and finding the answers you are looking for.

21st Annual ARC Industry Forum

Location: Booth #15, with our channel partner, Gray Matter Systems, Renaissance Orlando Hotel, Orlando, FL

Join us at the 21st annual ARC Industry Forum in Orlando, Florida to learn more about how the digital enterprise will be realized and the benefits that this can bring. Discover what your peers are doing today and what steps they are taking in their respective journeys.


Do you know of an event you think CyberX should attend?
Visit our Contact Us page and let us know

Securing the OT Network to Maintain Productivity

Designed as a situational-aware platform, XSense seamlessly connects to an existing setup and begins to model the network like a state machine. Acting as an invisible layer, XSense shows results within minutes by collecting data from around the OT Network and utilizing Big Data and Machine Learning to better understand the its operational behavior.

Understanding how the network operates and when it changes, assures detection of unfamiliar activity, be it a cyber-attack, an operational malfunction or a tampering incident. In addition, running forensics on traffic, which was collected by XSense, provides visibility and insight into both operational and security events in the OT Network.

Complete Visibility and Real-Time Alerting

Real-Time Operational and Cyber Incident Alerts

  • Immediate and complete visibility into the operational network
  • Alerts about existing operational and cyber threats
  • Maintain productivity and business continuity
  • On-going machine learning process

Active Machine Learning and Modeling

  • Continuous learning of the operational network
  • Adapting to changes within the network
  • Real-time detection of operational and cyber threats
  • Rapid incident identification and alerting
  • Lowering risk of downtime
  • Facilitating administration

Zero Impact
Installation

  • No interruption to operation (plug and play)
  • Operates within minutes of the installation
  • No overhead, pre-requisites or additional investments