ICSJWG 2010 Spring Conference Presentations
Day 1 - April 6th
- Welcome and Keynote
- National Cybersecurity and Communications Integration Center
Preston Werntz, DHS
- Vendor Subgroup Meeting
Rick Lichtenfels, GCC
Eric Cosman, SCC
- Workforce Development Subgroup Meeting
Ben Wible, GCC
Marcus Sachs, SCC
- Information Sharing Subgroup Meeting
George Bamford, GCC
Nathan Faith, SCC
- International Subgroup Meeting
Sean McGurk, GCC
Michael Assante, SCC
- Research and Development Subgroup Meeting
Douglas Maughan, GCC
David Norton, SCC
- ICS Roadmap Development Subgroup Meeting
Perry Pederson, GCC
Tim Roxey, SCC
- Lessons Learned Performing Cyber Asset Discovery at Generating Facilties
Matthew Luallen, Encari
- Defeating Malicious Code
Phillip Hallam-Baker, Default Deny Security Inc.
- Cyber Resiliency Review - Evaluation Methodology
Bradford Willke, Dept. of Homeland Security
- SCC Break-out Meeting
Tim Roxey
- What Went Wrong? A Study of Actual Industrial Cyber Security Incidents
Zach Tudor, SRI International
Mark Fabro, Lofty Perch
Back to top
Day 2 - April 7th
- Functional Cyber Security Best Practices Certification Program: An Update for Industrial Stakeholders
Peter Kwaspen, Shell
Tyler Williams, Wurldtech
- Intelligence 2010 for Critical Infrastructure
Sean McBride, Critical Intelligence
Rick Howard, iDefense Intelligence
- The Need to Connect the Dots on ICS Cyber Incidents
Joe Weiss, Applied Control Solutions, LLC
- The Role of Product Certification in an Overall Cyber Security Strategy
Andre Ristaino, ISCI
Thomas Culling, Chevron
Paul Forney, Invensys
John Cusimano, Exida
- Applying Current Security Technology for Endpoint Protection, Host Intrusion Prevention for DCS
Ernest Rakaczky, Invensys
Charles Ross, McAfee
- The Lemons Interoperable Security Project
Brian Smith, EnerNex Corporation
- Setting Up a Patch Management Program for ICS
Eric Cosman, ISA
- Experience with Network Anomaly Detectionon Industrial Networks
Andrew Ginter, Industrial Defender
- Harnessing the Power of Visualization for Control System Cybersecurity
Emily Frye, SRA International
Alan Hendricks, SRA International
- Securing a Legacy SCADA System
Joy Renfro, USACE
Bart Rylander, USACE
US Army Corps of Engineers
- SCADAnet: A Standards-Based Practical Solution for Securing ICS
Steven Venema, Boeing
- Control Systems Security: A Case Study in Collaboration
Clint Kreitner, CIS
Sharon Xia, AREVA
Mike Assante, NERC
Dale Peterson, Digital Bond, Inc.
Stephen Hilt, TVA
- Beyond Regulatory Compliance Toward a Comprehensive Security Program
Jerald Dawkins, True Digital Security
- Sophia: Tool development for ICS Security
James Davidson, Idaho National Laboratory
- Fingers Burned and Lessons Learned: Securing Modbus TCP and OCP with Deep Packet Inspection Technologies
Eric Byres, Byres Security Inc.
- Incorporating Cybersecurity into Your Automation Project's Execution Methodology
Joel Langill, ENGlobal Automation
- The Silent Risk We're Living with Using Convergent Risk Analysis to Uncover Insider Threats
Pan Kamal, AlertEnterprise, Inc
- Scanning a Clone in the Cloud; Safe DCS Vulnerability Scanning
Bernie Pella, Savannah River Nuclear Solutions
- Strategic Identity Management in Industrial Control Systems
Justin Harvey, Encari
- Securing Serial Communications in Electric Industry Substations
Robert Sill, RealTime Interactive Systems
- Evaluating the Safety and Security of Automation Procducts, Systems, and Suppliers
John Cusimano, Exida
- Safety Considerations for SCADA/DCS Cybersecurity
Walter Sikora, Industrial Defender
- Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols
Hirmanshu Khurana, University of Illinois
- Evaluation of ISA 99 in a Real-World Power Plant Security Assessment
Ragnar Schierholz, ABB Corporate Research
Back to top