CyberX cordially invites you to a seminar about

Emerging ICS/SCADA Threats and How to Maximize Operational Resilience

Wednesday, June 20 – 13:30 – 18:00, followed by apéritif

Kameha Suite Frankfurt, Taunusanlage 20, 60325 Frankfurt Am Main

Register now, seating is limited and all attendees must be pre-approved


A new class of targeted ICS malware such as TRITON and Industroyer/CrashOverride, as well as WannaCry and NotPetya, have shown that the cyber risk to production uptime is real.

Boards of directors now understand that sophisticated malware can indeed be used to hijack industrial devices, lock down production facilities, and impact -financial results. Other potential impacts of a successful ICS cyberattack include catastrophic safety failures, environmental release of hazardous materials, and theft of corporate trade secrets.

But what can be done to mitigate ICS risks? OT environments are quite different than IT environments, with longer patch cycles, legacy devices, weak authentication, undocumented network topologies, and specialized non-IT protocols.

During the seminar, we will hear case studies, discuss the new ICS/SCADA threat landscape, understand why perimeter security tools are not sufficient and talk about why and how to fuse OT security into the corporate SOC.

This event is an opportunity to network with your peers and share best practices for protecting ICS/SCADA networks from new and emerging ICS threats.

Download Event Brochure


13:30 – 14:00 – Welcome and Co¬ffee

14:00 – 14:15 – Introduction
Omer Schneider, CEO & Co-Founder, CyberX, Former Commander of Military Cyber Unit

14:15 – 15:00 – Keynote Session: Creating a Unified Strategy for IT/OT/IIoT Security
Bernd Jaeger, Practice Lead IoT/ICS Security, Telekom Security, T-Systems International GmbH

15:00 – 15:30 – A New Strategic Approach to Protecting Global Manufacturing Sites from ICS Cyber Threats
Yaniv Maimon, Deloitte Cyber Risk Services, Pharmaceuticals Project Lead

15:30 – 16:00 – Case Study: Why the Increase in Cyber Threats to Critical Infrastructures Required a Shift in Our Security Strategy
Gregor Nyffeler, Head of IT, EWZ Energy

16:00 – 16:30 – Break

16:30 – 17:15 – A History of Nation-State Attacks on Critical Infrastructure
Phil Neray, VP of Industrial Cybersecurity, CyberX

17:15 – 17:45 – Technical Demo: Maturity Model & Key Use Cases for ICS Security
Joe DiPietro, VP of Customer Success, CyberX

17:45 – open – Drinks, Appetizers & Peer Networking

The speakers will be on premises for conversations and Q&A

Register for this event

About CyberX

Founded by military cyber experts with nation-state expertise defending critical infrastructure, CyberX provides the most widely-deployed industrial cybersecurity platform for continuously reducing ICS risk. The CyberX platform combines an embedded understanding of industrial devices, protocols, and applications with ICS-specific continuous monitoring and anomaly detection, asset and network topology discovery, risk and vulnerability management, automated threat modeling, and threat intelligence.

To see CyberX’s OT security platform in action, request a demo here.


13:00-13:30 Registration & Coffee
13:30-13:45 Welcome
Omer Schneider, CEO/Co-Founder
13:45-14:30 Case Study: Continuous Monitoring of Cyber and Operational Incidents for Electrical Substations
Markus Lenzin, Head of Substation Automation Technology
Swissgrid AG
14:30-15:15 Assessing Vulnerabilities & Risk in Manufacturing Plants
Head of IT Security at a Global Manufacturer
15:15-15:45 Break
15:45-16:15 Auditing OT Using In-Depth Network Analytics
Matthias Bossardt, Partner & Head of Cyber Security Services
16:15-16:45 Machine Learning for Industrial Cybersecurity
Bernd Jaeger, Practice Lead for IoT/ICS Security
Deutsche Telekom, T-Systems Security
16:45-17:15 Update on IIOT & ICS Threat Intelligence Research
Nir Giller, CTO/Co-Founder
17:15-18:00 How to Present Cyber Risk to the Board
Reto Francioni, Chairman of the Board of Directors
Swiss International Airlines
18:00-Open Apéro Riche and Networking
The speakers will be onsite for conversations and Q&A

Seminar Abstract

According to the Ponemon Institute survey, nearly 70% of organizations sampled suffered a security compromise resulting in the loss of confidential information or operational disruption in their Operational Technology (OT) environments, in the past 12 months. In addition, 59% of cybersecurity managers believe there is greater risk in OT than IT environments.

A range of diverse cyber-adversaries, including nation-states, cybercriminals, hacktivists, and malicious insiders, pose financial, reputational and regulatory risk to global industries.

The challenge is compounded as organizations adopt digitization initiatives such as Industry 4.0 and Smart Grid, further increasing risk by creating a larger attack surface from new IIoT devices and the convergence of IT and OT networks to support real-time intelligence.

The business impact can include costly production outages, safety failures, and environmental release of hazardous materials, as well as theft of corporate IP such as sensitive information about proprietary manufacturing processes and product designs.

This workshop will allow participants to network with their peers and share best practices for protecting their industrial networks from these types of risks.