ICSJWG 2011 Spring Conference Presentations

Download the ICSJWG 2011 Agenda

Day 2 - Tuesday, May 3, 2011
ICSJWG Conference Plenary Sessions and Presentations

8:00 - 8:15

Marty Edwards and Tim Roxey, ICSJWG Co-Chairs

8:15 - 8:45

Keynote Speaker
Marty Edwards, Director, Control Systems Security Program
U.S. Department of Homeland Security

8:45 - 9:15

Security From the Ground Up
Steve Parker, National Electric Sector Cybersecurity Organization (NESCO), EnergySec

9:15 - 9:45

The Voice of the Asset Owner
Darren Highfill, UtiliSec

9:45 - 10:00


10:00 - 10:30 Exploitation 101: Turning a SCADA Vulnerability into a Successful Attack
Joel Langill, SCADAHacker
10:30 - 11:00 National Cybersecurity & Communications Integration Center (NCCIC) Presentation
Patrick Beggs, Director of Operations, NCCIC
U.S. Department of Homeland Security
11:00 - 11:10 Vendor <Solutions Technology> Subgroup Status Presentation
Marty Edwards, GCC Co-Chair
Eric Cosman, SCC Co-Chair
11:10 - 11:20 ICS Roadmap Subgroup Status Presentation
Perry Pederson, GCC Co-Chair
Tim Roxey, SCC Co-Chair
11:20 - 11:30 Workforce Development Subgroup Status
Presentation Keri Nusbaum, GCC Co-Chair
Mike Glover, SCC Co-Chair
11:30 - 1:00 Lunch


Day 2 - Tuesday, May 3, 2011
ICSJWG Conference Presentations


Track I

Track II

Track III

1:00 - 1:45

Mike Ahmadi
Gib Sorebo
Dr. Fred Cohen

Reconsidering the Risk-Based Formulas and Standards Approach To Improving Security

Andrew Ginter
Joel Langill


How Stuxnet Spreads: A Study of Infection Paths in Best Practice Systems

Eric Cornelius


Lessons Learned in Industrial Control Systems Incident Response

1:45 - 2:00




2:00 - 2:45

Larry Alls
Lori Hayes
Anna Wang

Integrated Factory
Acceptance Test (IFAT)
as Security Best Practice

Tatsuaki Takebe
Dr. Kazuya Suzuki

Network Packet Visualization Technology in Process Control Systems

David Sawin


Control Systems Security Program Transportation Sector

2:45 - 3:00




3:00 - 3:45

Scott Aken
Pamela Warren

In the Dark in 2010 - Necessary Progress in 2011

Ryan Breed


DNS Data and Metadata Extraction: Techniques for DNS Analysis

Mark Heard


Advancing the Roadmap Implementation

3:45 - 4:00




4:00 - 4:45

Andre Ristaino
Graham Speake
John Cusimano

Validating the Security Assurance of Industrial Automation Products

Joseph McCormick
Tom Overman

Cyber Security Demonstration in a Distributed ICS

Scott Dickerson


Protecting Maritime CIKR

4:45 - 5:00




5:00 - 7:00


Resource Database Management Hack
“Little Chem” Process Control Hack


Day 3 - Wednesday, May 4, 2011
ICSJWG Conference Presentations

7:00 - 8:00



Track I

Track II

Track III

8:00 - 8:45

Brian Lenane

Cyber Security Working Group: A Report from the NIST Cyber Security Working Group

Ernie Hayden

The Four Layers of Smart Grid Security

Jonathan Pollet

APT (Night Dragon) Methodology and Lessons Learned

8:45 - 9:00




9:00 - 9:45

John Cusimano


Achieving Software Security Assurance

Steve Parker
William Fletcher

Leveraging Hashing Techniques to Reduce Risks posed by APTs to Control System Software

Kevin Hemsley


ICS Vulnerability Disclosure: To Disclose or Not to Disclose

9:45 - 10:00




10:00 - 10:45

Dr. Nabil Adam

Combined Analysis of the Safety and Security Properties of Cyber-physical System

Bernie Pella

A Paradigm Change to Cyber Security

Dale Peterson

New ICS Security Tools Funded by the U.S. Government

10:45 - 11:00




11:00 - 11:45

Daniel Noyes


Where's Daniel Webster When You Need Him? Defining ICS Incident Terminology

Art Manion
Michael Orlando

Fuzz Testing for Dummies

Bill Beary


Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS)

11:45 - 1:15




1:15 - 2:00

Lt. Col. Wallace Pennington

Prioritizing CIKR Targets for Cyber Attacks

Swapnil Wadikar

Risk-Based Cyber Security Strategy for Maximizing Business Impact

William Fletcher

Vulnerabilities with Protective Relays Serially-Connected to Transitional BES Substation Networks

2:00 - 2:15





Day 3 - Wednesday, May 4, 2011
ICSJWG Conference Presentations


Track I

Track II

Track III

2:15 - 3:00

Lisa Kaiser


Risk Management Framework

Ernest Rakaczky
Paul Forney

Security Development Lifecycle for Control Systems

Nate Kube

The Achilles Practices Certification Program

3:00 - 3:15




3:15 - 4:00

Dr. Josef Allen


Resilient Real-Time Cyber-Physical Systems

John Caruthers
Ken Schmutz

FBI and Cyber Security for ICS/SCADA Systems

Matt Gibson
Bradley Yeates

Functional Analysis Methods: A Case Study in Nuclear Power

4:00 - 4:15




4:15 - 5:00

Rhonda Dunfee
Dr. Diane Hooie
Steve Parker
Dr. Erfan Ibrahim

The Power of a Network: Applying Reed's Law to a Public-Private Partnership

Lior Frenkel


One-way Myths: Common Misperceptions about Unidirectional Gateways

Eric Knapp


Obtaining Situational Awareness (Across Isolated Systems)

5:00 - 5:15




5:15 - 5:30

Closing Remarks and Conference Wrap-up
Marty Edwards and Tim Roxey, ICSJWG Co-Chairs

Back to top