Cyber Security Events

Join CyberX at the following cyber security events and webinars throughout the year.

Event Details

Event Description

Upcoming Events

MANUSEC USA

Start date: October 9, 2018

End date: October 10, 2018

Location: Trump International Hotel and Tower, 401 Wabash Ave, Chicago, IL

MANUSEC USA

The 3rd edition of the Manusec Summit will bridge the gap between the process control and corporate IT senior level professionals, allowing them to discuss challenges, critical issues and debate best practice guidelines

GridSecCon

Start date: October 15, 2018

End date: October 19, 2018

Location: TBD

GridSecCon

NERC’s annual Grid Security Conference (GridSecCon) series brings together cyber security and physical security experts from industry and government to share emerging security trends, policy advancements, and lessons learned related to the electricity industry. The first conference was held in New Orleans in October 2011, and has rotated through the NERC Regional Entities across North America.

ICS Cybersecurity

Start date: October 22, 2018

End date: October 25, 2018

Location: InterContinental Buckhead Atlanta, Atlanta, GA 30326

ICS Cybersecurity

Produced by SecurityWeek, the ICS Cyber Security Conference is the conference where ICS users, ICS vendors, system security providers and government representatives meet to discuss the latest cyber-incidents, analyze their causes and cooperate on solutions. Since its first edition in 2002, the conference has attracted a continually rising interest as both the stakes of critical infrastructure protection and the distinctiveness of securing ICSs become increasingly apparent.

Past Events

Gartner Security Summit

Start date: June 4, 2018

End date: June 7, 2018

Location: Gaylord National Resort & Convention Center, 201 Waterfront St, National Harbor, MD

Gartner Security Summit

The 2018 Gartner Security & Risk Management Summit agenda features five comprehensive programs to cover your security and risk management key priorities and challenges. At the conference you’ll learn how to take a strategic approach to risk, improve business and data resilience, build digital trust and implement a new generation of continuously adaptive security strategies.

Cyber Security for Oil & Gas

Start date: May 21, 2018

End date: May 22, 2018

Location: DoubleTree by Hilton Houston Downtown, 400 Dallas Street, Houston, Texas, 77002

Cyber Security for Oil & Gas

The Cyber Security for Oil & Gas Summit seeks to change the dynamics of the discussion around cyber security. The event will bring the fundamentals of updating cyber security systems for the purpose of protecting company assets for Oil & Gas companies

Ignite ’18 Security Conference

Start date: May 21, 2018

End date: May 24, 2018

Location: Anaheim Convention Center, Anaheim, CA

Ignite ’18 Security Conference

Visit CyberX in the Innovation Sandbox Monday, May 21 through Thursday, May 24 and see an on-stage demo by CyberX’s Chief Architect on Thursday, May 24 at 10:30am PT, during the Application Developer Lightning Round sessions

Emerging ICS/SCADA Threats and How to Maximize Operational Resilience

Date: May 3, 2018

Time: 13:00

Location: Churchill War Rooms, Clive Steps, King Charles Street, London, SW1A 2AQ

Emerging ICS/SCADA Threats and How to Maximize Operational Resilience

CyberX invites you to a ½ day seminar, where you will network with your peers and hear CISOs and executives from leading organizations in the electricity, pharmaceutical and manufacturing sectors, share their experiences, challenges and what path they took to maximize operational resilience. Mo Ahddoud, CISO, Scotia Gas Networks will talk about “How to converge IT and OT security and live to tell”, and Mr. Ilan Abadi, Vice President & Global CISO of Teva Pharmaceutical Industries will deliver the keynote.

RSA Conference 2018

Start date: April 16, 2018

End date: April 20, 2018

Location: Israeli Pavilion (#S735, South Hall), Moscone Center & Marriott Marquis, San Francisco, CA

RSA Conference 2018

RSA Conference conducts information security events around the globe that connect you to industry leaders and highly relevant information. RSA also delivers, on a regular basis, insights via blogs, webcasts, newsletters and more so you can stay ahead of cyber threats.

SANS Webinar: Anatomy of the TRITON ICS Cyberattack

Date: March 30, 2018

Time: 1PM EST

Location: Webinar

SANS Webinar: Anatomy of the TRITON ICS Cyberattack

In this educational SANS webinar led by Justin Searle, Director of ICS Security at InGuardians and a senior SANS instructor since 2011, and Phil Neray, VP of Industrial Cybersecurity at CyberX, the ICS security company founded by military cyber experts with nation-state expertise defending critical infrastructure, you’ll learn about:

  • The technical architecture of the TRITON malware
  • Threat models showing how the attackers could have compromised the engineering workstation
  • How to implement a multi-layered active defense to defend against similar attacks in the future

SANS ICS Security Summit

Start date: March 19, 2018

End date: March 20, 2018

Location: Hyatt Regency, 9801 International Dr, Orlando, FL

SANS ICS Security Summit

The annual ICS Security Summit brings together in-the-field practitioners and leading experts to share ideas, methods, and techniques for defending control systems. This year’s SANS ICS Security Summit focuses on the theme “Who is in control of your control system?” In-depth presentations and interactive panel discussions will highlight real-world approaches that work and make a difference for the individuals fighting this fight every day. As an attendee, you’ll walk away with actionable information that you can use to better secure your organization.

Emerging ICS/SCADA Security Threats — and How to Maximize Operational Resilience

Date: March 13, 2018

Time: 13:30

Location: Hilton Zurich Airport Hotel, Opfikon-Glattbrugg

Emerging ICS/SCADA Security Threats — and How to Maximize Operational Resilience

CyberX and the Security Interest Group Switzerland (SIGS) cordially invite you to an educational ½-day seminar about “Emerging ICS/SCADA Security Threats — and How to Maximize Operational Resilience.”

This event is an opportunity for participants to network with their peers and share best practices for protecting ICS/SCADA networks from these new and emerging threats.

CS4CA USA

Start date: March 6, 2018

End date: March 8, 2018

Location: JW Marriott, 5150 Westheimer Rd, Houston, TX

CS4CA USA

Now in its 11th edition, the Cyber Security for Critical Assets Summit (USA) boasts a dynamic double-stream agenda alongside opportunities to participate in practical exercises though an exclusive cybersecurity workshop.

S4x18

Start date: January 16, 2018

End date: January 18, 2018

Location: Miami Beach, FL

S4x18

Now in its 11th year, the main S4 Conference in Miami Beach will have 300+ attendees watching 3 days of sessions on 3 stages. It is the one show where advanced ICS security, OT and IIoT content can be presented to an audience that will get it.


Do you know of an event you think CyberX should attend?
Visit our Contact Us page and let us know

Securing the OT Network to Maintain Productivity

Designed as a situational-aware platform, XSense seamlessly connects to an existing setup and begins to model the network like a state machine. Acting as an invisible layer, XSense shows results within minutes by collecting data from around the OT Network and utilizing Big Data and Machine Learning to better understand the its operational behavior.

Understanding how the network operates and when it changes, assures detection of unfamiliar activity, be it a cyber-attack, an operational malfunction or a tampering incident. In addition, running forensics on traffic, which was collected by XSense, provides visibility and insight into both operational and security events in the OT Network.

Complete Visibility and Real-Time Alerting

Real-Time Operational and Cyber Incident Alerts

  • Immediate and complete visibility into the operational network
  • Alerts about existing operational and cyber threats
  • Maintain productivity and business continuity
  • On-going machine learning process

Active Machine Learning and Modeling

  • Continuous learning of the operational network
  • Adapting to changes within the network
  • Real-time detection of operational and cyber threats
  • Rapid incident identification and alerting
  • Lowering risk of downtime
  • Facilitating administration

Zero Impact
Installation

  • No interruption to operation (plug and play)
  • Operates within minutes of the installation
  • No overhead, pre-requisites or additional investments