IET logo
cyber ics - header

Cyber Security for Industrial Control Systems

Secure solutions for cyber-physical systems

7 - 8 February 2018 | IET London: Savoy Place

IET London: Savoy Place (logo) CPD 16 hours

Conference programme: 8 February 2018


Registration and refreshments


Chairman’s welcome

Chair: Mike St John Green, Independent Security Consultant, IET Cyber Security Network


Keynote: Cybersecurity for industrial automation and control systems in the major hazard industries - complying with the law

Cyber security is a term used to define measures taken to protect industrial automation and control systems (IACS) against threats to security through accidental circumstances, actions or events, or through deliberate attack.

This session will describe the work the Health and Safety Executive is doing and the approaches that can be used by the Operators in ensuring risks are identified and managed to ‘as low as reasonably practicable’ using a proportionate approach to comply with the requirements of the law.

Sarabjit Purewal, Head of Operations in the Chemicals sector of the Health and Safety Executive (HSE), Health and Safety Executive, UK




National Cyber Security Centre strategy, objectives and guidance to help improve cyber-security resilience of UK Critical National Infrastructure from cyber-physical threats

The NCSC was set up in 2016 to help protect UK’s critical services from cyber attacks, manage major incidents, and improve the underlying security of the UK Internet through technological improvement and advice to citizens and organisations.

NCSC supports the most critical organisations in the UK, the wider public sector, industry and SMEs. When incidents do occur, NCSC provides effective incident response to minimise harm to the UK, help with recovery, and learn lessons for the future.

Tony B, Operations Head of CNI Capability and ICS Tech Lead, NCSC, UK


Refreshments and networking


International case studies: Insights from security assessment before planning the security road-map

Many industrial and critical infrastructure organisations realise now the growing threat to their OT networks and start planning the required protection plans.

However most of these networks have been built over the years with various systems, lack of security practices and no up-to-date asset management.

As such it is recommended to start with a security assessment dedicated for the OT network before deploying security solutions. In this session we will present how to plan such an assessment, what it should cover and how to conduct it with zero-impact on the on-going operations.

Gilad Bandel, VP Products, Radiflow, Israel


Cyber resilience in civil nuclear – moving towards a security lifecycle approach

  • Initial considerations – threat, vulnerability and trust
  • Know thyself - your estate and your maturity levels
  • Assurance activity – what can you test?
  • Forward thinking – secure by design

Phil Litherland, Principal Consultant Strategy and Advisory, Context, UK


Active defence using an operational technology honeypot

The presentation discusses research to examine the benefits of deploying a high interaction hardware Operational Technology (OT) or Industrial Control System (ICS) honeypot.

The OT Honeypot Project successfully demonstrated an innovative approach to implementing a situational awareness capability in an operational industrial control system environment. The approach also contributes to an organisation’s potential forensics capability for ICS systems.
This was achieved via a remote access platform without disrupting operations, whilst preserving vital evidence.

Richard Piggin, Chairman, IET Cyber Security Network


Lunch and networking


Keynote: Appetite for destruction: Addressing emerging threats today

This presentation showcases the attacks our infrastructure is facing today, but provides insights where partners can gain access to this intelligence, and the measures that can be used to mitigate against them.

Raj Samani, Chief Scientist & McAfee Fellow, McAfee, UK




Design-in cyber security, lessons from The Single European Sky Air Traffic Management Research programme (SESAR)

SESAR is a bold programme to modernise the management of air traffic control. In recognition of the future security challenges a cross-cutting programme of ‘design-in’ security was established early on in the programme to define the security requirements of next generation air traffic control operations.

This talk will describe the cross industry collaborative approach taken, its evolution, aspects of the methodology and supporting tools, unsolved problems, difficult challenges and lessons learned. 

Martin Hawley, Founder, Winsland Ltd., UK


Industry 4.0: "Digitalisation changes everything"

Siemens will give an overview of Industry 4.0, how data is changing manufacturing, and security features of their IoT Operating System.

  • Drivers of the 4th Industrial revolution
  • Factories of the future
  • The big data challenge
  • IoT in the industrial environment
  • MindSphere Security

Mark McCormick, Industrial IT Security Engineering Consultant, Plant Security Services, SIEMENS, UK


Refreshments and networking


The industrial immune system: using machine learning for real-time threat detection across OT and IT

This presentation will discuss the challenge of cyber security within ICS and SCADA environments and the benefits of a self-learning approach, using machine learning and artificial intelligence. The following topics will be covered:

  • Unifying IT and OT security operations for converging industrial networks
  • Developing a security monitoring strategy for ICS and SCADA environments
  • Leveraging machine learning and AI to defend operational environments against highly sophisticated cyber attacks
  • Real-life threat case studies

Andrew Tsonchev, Cyber Security & SCADA Specialist, Darktrace


Using machine learning to secure industrial control systems

  • The anatomy of attacks on industrial control systems
  • Potential attack disruption techniques
  • Deep learning and anomaly detection

Chris Hankin, Co-Director, Institute for Security Science and Technology, UK


Panel discussion: Artificial intelligence, standardisation and cyber security best practice guidance

How do we get the most of the information currently out there? Does one size fit all?

Take the opportunity to put questions to our expert panel of speakers, and share solutions with your peers to overcome the challenges you are facing in security of ICS.

  • Does the increased threat to ICS represent a game-changer or is it good enough to carry on as we are?
  • What does practical security look like in legacy ICS environments?
  • How do we certify ICS that are important to safety in the world of Industrie 4.0, with its reliance on data from multiple sources?
  • How do we assure ICS that incorporate machine-learning?

Chris Hankin, Co-Director, Institute for Security Science and Technology
Andrew Tsonchev
, Director of Technology, Darktrace Industrial, Darktrace
Richard Piggin
, Chairman, IET Cyber Security Network
Sarabjit Purewal
, Head of Operations in the Chemicals sector of the Health and Safety Executive (HSE), Health and Safety Executive, UK
Robert Orr
, Cyber Security Principal Consultant CNI (ICS, Transport, Regulation), Context, UK


Chair’s comments



Programme is correct at time of publication. Topics and speakers are subject to change.

View workshop programme >

Headline sponsor