Cyber Security for Industrial Control Systems
Secure solutions for cyber-physical systems
7 - 8 February 2018 | IET London: Savoy Place
Conference programme: 8 February 2018
Registration and refreshments
Chair: Mike St John Green, Independent Security Consultant, IET Cyber Security Network
Keynote: Cybersecurity for industrial automation and control systems in the major hazard industries - complying with the law
Cyber security is a term used to define measures taken to protect industrial automation and control systems (IACS) against threats to security through accidental circumstances, actions or events, or through deliberate attack.
This session will describe the work the Health and Safety Executive is doing and the approaches that can be used by the Operators in ensuring risks are identified and managed to ‘as low as reasonably practicable’ using a proportionate approach to comply with the requirements of the law.
Sarabjit Purewal, Head of Operations in the Chemicals sector of the Health and Safety Executive (HSE), Health and Safety Executive, UK
National Cyber Security Centre strategy, objectives and guidance to help improve cyber-security resilience of UK Critical National Infrastructure from cyber-physical threats
The NCSC was set up in 2016 to help protect UK’s critical services from cyber attacks, manage major incidents, and improve the underlying security of the UK Internet through technological improvement and advice to citizens and organisations.
NCSC supports the most critical organisations in the UK, the wider public sector, industry and SMEs. When incidents do occur, NCSC provides effective incident response to minimise harm to the UK, help with recovery, and learn lessons for the future.
Tony B, Operations Head of CNI Capability and ICS Tech Lead, NCSC, UK
Refreshments and networking
International case studies: Insights from security assessment before planning the security road-map
Many industrial and critical infrastructure organisations realise now the growing threat to their OT networks and start planning the required protection plans.
However most of these networks have been built over the years with various systems, lack of security practices and no up-to-date asset management.
As such it is recommended to start with a security assessment dedicated for the OT network before deploying security solutions. In this session we will present how to plan such an assessment, what it should cover and how to conduct it with zero-impact on the on-going operations.
Gilad Bandel, VP Products, Radiflow, Israel
Cyber resilience in civil nuclear – moving towards a security lifecycle approach
Phil Litherland, Principal Consultant Strategy and Advisory, Context, UK
Active defence using an operational technology honeypot
The presentation discusses research to examine the benefits of deploying a high interaction hardware Operational Technology (OT) or Industrial Control System (ICS) honeypot.
The OT Honeypot Project successfully demonstrated an innovative approach to implementing a situational awareness capability in an operational industrial control system environment. The approach also contributes to an organisation’s potential forensics capability for ICS systems.
Richard Piggin, Chairman, IET Cyber Security Network
Lunch and networking
Keynote: Appetite for destruction: Addressing emerging threats today
This presentation showcases the attacks our infrastructure is facing today, but provides insights where partners can gain access to this intelligence, and the measures that can be used to mitigate against them.
Raj Samani, Chief Scientist & McAfee Fellow, McAfee, UK
Design-in cyber security, lessons from The Single European Sky Air Traffic Management Research programme (SESAR)
SESAR is a bold programme to modernise the management of air traffic control. In recognition of the future security challenges a cross-cutting programme of ‘design-in’ security was established early on in the programme to define the security requirements of next generation air traffic control operations.
This talk will describe the cross industry collaborative approach taken, its evolution, aspects of the methodology and supporting tools, unsolved problems, difficult challenges and lessons learned.
Martin Hawley, Founder, Winsland Ltd., UK
Industry 4.0: "Digitalisation changes everything"
Siemens will give an overview of Industry 4.0, how data is changing manufacturing, and security features of their IoT Operating System.
Mark McCormick, Industrial IT Security Engineering Consultant, Plant Security Services, SIEMENS, UK
Refreshments and networking
The industrial immune system: using machine learning for real-time threat detection across OT and IT
This presentation will discuss the challenge of cyber security within ICS and SCADA environments and the benefits of a self-learning approach, using machine learning and artificial intelligence. The following topics will be covered:
Andrew Tsonchev, Cyber Security & SCADA Specialist, Darktrace
Using machine learning to secure industrial control systems
Chris Hankin, Co-Director, Institute for Security Science and Technology, UK
Panel discussion: Artificial intelligence, standardisation and cyber security best practice guidance
How do we get the most of the information currently out there? Does one size fit all?
Take the opportunity to put questions to our expert panel of speakers, and share solutions with your peers to overcome the challenges you are facing in security of ICS.
Programme is correct at time of publication. Topics and speakers are subject to change.