ICSJWG 2011 Spring Conference Presentations


Download the ICSJWG 2011 Agenda


Day 2 - Tuesday, May 3, 2011
ICSJWG Conference Plenary Sessions and Presentations

8:00 - 8:15

Welcome
Marty Edwards and Tim Roxey, ICSJWG Co-Chairs

8:15 - 8:45

Keynote Speaker
Marty Edwards, Director, Control Systems Security Program
U.S. Department of Homeland Security

8:45 - 9:15

Security From the Ground Up
Steve Parker, National Electric Sector Cybersecurity Organization (NESCO), EnergySec

9:15 - 9:45

The Voice of the Asset Owner
Darren Highfill, UtiliSec

9:45 - 10:00

Break

10:00 - 10:30 Exploitation 101: Turning a SCADA Vulnerability into a Successful Attack
Joel Langill, SCADAHacker
10:30 - 11:00 National Cybersecurity & Communications Integration Center (NCCIC) Presentation
Patrick Beggs, Director of Operations, NCCIC
U.S. Department of Homeland Security
11:00 - 11:10 Vendor <Solutions Technology> Subgroup Status Presentation
Marty Edwards, GCC Co-Chair
Eric Cosman, SCC Co-Chair
11:10 - 11:20 ICS Roadmap Subgroup Status Presentation
Perry Pederson, GCC Co-Chair
Tim Roxey, SCC Co-Chair
11:20 - 11:30 Workforce Development Subgroup Status
Presentation Keri Nusbaum, GCC Co-Chair
Mike Glover, SCC Co-Chair
11:30 - 1:00 Lunch

 

Day 2 - Tuesday, May 3, 2011
ICSJWG Conference Presentations

Presentations

Track I

Track II

Track III

1:00 - 1:45

Mike Ahmadi
Gib Sorebo
Dr. Fred Cohen

Reconsidering the Risk-Based Formulas and Standards Approach To Improving Security

Andrew Ginter
Joel Langill

 

How Stuxnet Spreads: A Study of Infection Paths in Best Practice Systems

Eric Cornelius

 

Lessons Learned in Industrial Control Systems Incident Response

1:45 - 2:00

 

Break

 

2:00 - 2:45

Larry Alls
Lori Hayes
Anna Wang

Integrated Factory
Acceptance Test (IFAT)
as Security Best Practice

Tatsuaki Takebe
Dr. Kazuya Suzuki

Network Packet Visualization Technology in Process Control Systems

David Sawin

 

Control Systems Security Program Transportation Sector

2:45 - 3:00

 

Break

 

3:00 - 3:45

Scott Aken
Pamela Warren

In the Dark in 2010 - Necessary Progress in 2011

Ryan Breed

 

DNS Data and Metadata Extraction: Techniques for DNS Analysis

Mark Heard

 

Advancing the Roadmap Implementation

3:45 - 4:00

 

Break

 

4:00 - 4:45

Andre Ristaino
Graham Speake
John Cusimano

Validating the Security Assurance of Industrial Automation Products

Joseph McCormick
Tom Overman

Cyber Security Demonstration in a Distributed ICS

Scott Dickerson

 

Protecting Maritime CIKR

4:45 - 5:00

 

Break

 

5:00 - 7:00

 

Resource Database Management Hack
“Little Chem” Process Control Hack

 

Day 3 - Wednesday, May 4, 2011
ICSJWG Conference Presentations

7:00 - 8:00

Registration

Presentations

Track I

Track II

Track III

8:00 - 8:45

Brian Lenane

Cyber Security Working Group: A Report from the NIST Cyber Security Working Group

Ernie Hayden

The Four Layers of Smart Grid Security

Jonathan Pollet

APT (Night Dragon) Methodology and Lessons Learned


8:45 - 9:00

 

Break

 


9:00 - 9:45

John Cusimano

 

Achieving Software Security Assurance

Steve Parker
William Fletcher

Leveraging Hashing Techniques to Reduce Risks posed by APTs to Control System Software

Kevin Hemsley

 

ICS Vulnerability Disclosure: To Disclose or Not to Disclose

9:45 - 10:00

 

Break

 

10:00 - 10:45

Dr. Nabil Adam

Combined Analysis of the Safety and Security Properties of Cyber-physical System

Bernie Pella

A Paradigm Change to Cyber Security

Dale Peterson

New ICS Security Tools Funded by the U.S. Government

10:45 - 11:00

 

Break

 

11:00 - 11:45

Daniel Noyes

 

Where's Daniel Webster When You Need Him? Defining ICS Incident Terminology

Art Manion
Michael Orlando

Fuzz Testing for Dummies

Bill Beary

 

Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS)

11:45 - 1:15

 

Lunch

 

1:15 - 2:00

Lt. Col. Wallace Pennington

Prioritizing CIKR Targets for Cyber Attacks

Swapnil Wadikar

Risk-Based Cyber Security Strategy for Maximizing Business Impact

William Fletcher

Vulnerabilities with Protective Relays Serially-Connected to Transitional BES Substation Networks

2:00 - 2:15

 

Break

 

 

Day 3 - Wednesday, May 4, 2011
ICSJWG Conference Presentations

Presentations

Track I

Track II

Track III

2:15 - 3:00

Lisa Kaiser

 

Risk Management Framework

Ernest Rakaczky
Paul Forney

Security Development Lifecycle for Control Systems

Nate Kube

The Achilles Practices Certification Program

3:00 - 3:15

 

Break

 

3:15 - 4:00

Dr. Josef Allen

 

Resilient Real-Time Cyber-Physical Systems

John Caruthers
Ken Schmutz

FBI and Cyber Security for ICS/SCADA Systems

Matt Gibson
Bradley Yeates

Functional Analysis Methods: A Case Study in Nuclear Power

4:00 - 4:15

 

Break

 

4:15 - 5:00

Rhonda Dunfee
Dr. Diane Hooie
Steve Parker
Dr. Erfan Ibrahim

The Power of a Network: Applying Reed's Law to a Public-Private Partnership

Lior Frenkel

 

One-way Myths: Common Misperceptions about Unidirectional Gateways

Eric Knapp

 

Obtaining Situational Awareness (Across Isolated Systems)

5:00 - 5:15

 

Break

 

5:15 - 5:30

Closing Remarks and Conference Wrap-up
Marty Edwards and Tim Roxey, ICSJWG Co-Chairs

Back to top