The Houston CISO Executive Summit is our opportunity to strengthen our networks, our knowledge and our expertise. Built by CISOs, for CISOs, this invitation-only conference offers dynamic speakers and a chance to collaborate to better face current and future threats.
We’ll share insights and best practices on the industry’s hottest topics — including threat intelligence, security awareness, IT risk management and the expanding threat landscape.
The premier gathering of security, risk management and business continuity management leaders,
Gartner Security & Risk Management Summit 2017 delivers the insight you need to guide your organization to a secure digital business future.
It’s a unique opportunity to reinvent your approach to security and risk for the digital age, based on Gartner’s trusted independent research and practical recommendations.
At Telekom Congress Magenta Security 2017, you can look forward to exciting keynote speeches, networking formats, and breathtaking demonstrations of red hot security topics. The second Telekom Magenta Security Congress will take place on June 20 and 21, 2017 at the ICM/Messe München. We cordially invite you at Telekom Security – along with top-class experts from the security sector as well as national and international partners and customers – to attend our convention.
Now in its 20th year, Black Hat is the world’s leading information security event, providing attendees with the very latest in research, development and trends. Black Hat USA 2017 kicks off with four days of technical Trainings (July 22-25) followed by the two-day main conference (July 26-27) featuring Briefings, Arsenal, Business Hall, and more.
CyberX and the Security Interest Group Switzerland (SIGS) cordially invite you to a seminar about ”Best Practices for Industrial Cybersecurity.”
Featuring ICS experts from SwissGrid, LafargeHolcim, Deutsche-Telekom, KPMG and CyberX, the seminar will provide practical advice and an opportunity to meet with your peers about assessing ICS cyber risk and protecting ICS infrastructures.
Join us in London for the IT Security UK Strategy Meeting. As one former attendee put it, it’s a “great experience for meeting vendors. Valuable way to expand knowledge and attain new contacts”.
This educational webinar will provide an in-depth discussion of risk assessment and threat modeling for industrial networks. Featuring the lead author of “ICS Hacking Exposed,” the webinar will cover key topics from the book including ICS terminology; ICS risk assessment frameworks; examples of ICS vulnerabilities, threats and consequences; and how to use threat modeling to turn ICS threat information into actionable threat intelligence.
Operation BugDrop – Stage 1 Cyber-Reconnaissance in the Real-World
In February 2017, CyberX’s threat intelligence research team discovered a massive cyber-reconnaissance operation targeting critical infrastructure, scientific research and media in the Ukraine and other countries. The operation requires a massive back-end infrastructure to store, decrypt and analyze several Gigabytes per day of unstructured data that’s captured from its targets (including audio recordings, screen shots, documents and passwords). In this session, CyberX’s VP of Research will describe how their team discovered the malicious operation, reverse engineered the malware, and dissected its C&C mechanisms; as well as provide recommendations on how to protect your ICS infrastructure from these types of cyber-intrusions.
Presented by David Atch, VP of Research, CyberX
RSA Conference’s mission is to connect you with the people and insights that will empower you to stay ahead of cyber threats. We do this through our events in the US, the EMEA region and the Asia-Pacific region and through our digital outreach. However you access our community, RSA Conference is your best resource for exchanging ideas, learning the latest trends and finding the answers you are looking for.
Join us at the 21st annual ARC Industry Forum in Orlando, Florida to learn more about how the digital enterprise will be realized and the benefits that this can bring. Discover what your peers are doing today and what steps they are taking in their respective journeys.
This is a ‘must attend’ event for all which are interested in SCADA/OT Security! We are confident that the relationships you develop here will prove to be crucial to your continuing success.
The annual event will bring together the leaders of the cyber industry and government decision makers from around the globe! The trade show includes hundreds of companies and start ups with the latest technologies and solutions that meet the challenges for a wide range of sectors.
Don’t miss this unique networking opportunity!
Digital Bond’s S4 Events are the most advanced and largest ICS Cyber Security Events in the World. They feature great leading/bleeding edge content, the top expert presenters and attendees, great locations and a lot of fun. If you want to see the caliber of the sessions, look at the past videos on the S4 Events YouTube Channel.
At the 3rd annual SmartSec Europe 2016 conference, exhibition and networking forum, 120+ utility IT and OT cyber-security leaders come together to share the lessons learnt from recent implementations of advanced cyber-security technologies and processes.
Do you know of an event you think CyberX should attend?
Visit our Contact Us page and let us know
Securing the OT Network to Maintain Productivity
Designed as a situational-aware platform, XSense seamlessly connects to an existing setup and begins to model the network like a state machine. Acting as an invisible layer, XSense shows results within minutes by collecting data from around the OT Network and utilizing Big Data and Machine Learning to better understand the its operational behavior.
Understanding how the network operates and when it changes, assures detection of unfamiliar activity, be it a cyber-attack, an operational malfunction or a tampering incident. In addition, running forensics on traffic, which was collected by XSense, provides visibility and insight into both operational and security events in the OT Network.
Complete Visibility and Real-Time Alerting
Real-Time Operational and Cyber Incident Alerts
- Immediate and complete visibility into the operational network
- Alerts about existing operational and cyber threats
- Maintain productivity and business continuity
- On-going machine learning process
Active Machine Learning and Modeling
- Continuous learning of the operational network
- Adapting to changes within the network
- Real-time detection of operational and cyber threats
- Rapid incident identification and alerting
- Lowering risk of downtime
- Facilitating administration
- No interruption to operation (plug and play)
- Operates within minutes of the installation
- No overhead, pre-requisites or additional investments