Loading…
The Central ICS/SCADA Cyber Security Event of the Year for the APAC Region! This year’s conference will have THREE full days of content, and receptions and networking opportunities. You can register for the conference online to hold a spot.
Olivia [clear filter]
Wednesday, April 25
 

2:00pm PDT

Safeguarding Industrial Control Networks (Sponsored Session)
Last December, cyber attackers launched a new malware variant called TRITON, specifically designed to target industrial safety systems. It was used against a critical infrastructure facility in the Middle East, causing an operational outage. While this malware was not the first to impact operational networks, it illustrates that ICS networks are now directly in the crosshairs of attackers.

In this session, we will discuss the emergence of ICS-specific malware, how it’s being used to infiltrate industrial environments, and what operators can do to defend their ICS networks and critical assets to prevent disruptions.

Sponsored by: Indegy

Speakers
avatar for Mille Gandelsman

Mille Gandelsman

CTO and Co-Founder, Indegy
Mille Gandelsman is the CTO and Co-Founder of Indegy, an industrial cybersecurity startup that provides situational awareness and real-time security for industrial control networks. He leads Indegy’s technology research and product management activities. Prior to Indegy, Gandelsman... Read More →


Wednesday April 25, 2018 2:00pm - 2:45pm PDT
Olivia

2:45pm PDT

The Inherent & Intertwined Risks in Industrial Control Systems and Enterprise IT Systems
Today, cyber threats have grown not just in its depth (i.e. more sophisticated), but also in its breadth (i.e. expanded scope). It has grown from threats in Enterprise IT systems (IT) to Operation Technologies (OT). Generally, OT refers to critical infra-structures such as nuclear, chemical, energy, water plants, trains, planes, ships etc. In certain context, it is addressed as Industrial Control Systems (ICS), or Supervisory Control And Data Acquisition (SCADA) systems.
In this sharing, the speaker would share the typical risks in both IT and OT, and why they could not be addressed in separated perspectives. The contents will be delivered in a highly practical approach with much of the sharing being the speaker’s first-hand experiences and encounters operationally.

Speakers
avatar for Ken Soh

Ken Soh

CEO, Athena Dynamics
Ken Soh holds concurrent appoints as Group CIO of mainboard listed BH Global Corporation Limited and as the founding CEO of the group subsidiary cyber security company Athena Dynamics Pte Ltd. Ken has more than 25 years of working experience in the ICT industry. Prior to joining BH... Read More →


Wednesday April 25, 2018 2:45pm - 3:30pm PDT
Olivia

3:45pm PDT

Evaluating the Human Factor (the Wetware) in Industrial Cybersecurity
How problematic can the human element be in Industrial Cybersecurity?

Wetware refers to the human brain as analogous to, or in contrast with electronic
hardware and software. Although the human element is paramount in Industrial
Cybersecurity, its importance is not adequately highlighted in relevant International
Standards. This has striking similarity to the way the human element is inadequately
treated in most Functional Safety Standards.
This talk will provide a comparative review of standards on Industrial Cybersecurity
from the human factor point of view. It will also highlight its relevance and importance
with illustrations and case studies from the industry. It concludes with the authors'
recommendations on methodologies to embrace Wetware in lifecycle activities with a
holistic view-point.

Speakers
avatar for Dr John Lear

Dr John Lear

Principal, KAJE Cyber
Dr. John Lear has over 30 years’ experience in process plant and control systemdesign, operations, R&D and technology management. John co-developed theCHAZOP technique and has led over a hundred CHAZOPs, ranging from chemicalplant operation, through IT infrastructure to robot control... Read More →


Wednesday April 25, 2018 3:45pm - 4:30pm PDT
Olivia
 
Thursday, April 26
 

2:15pm PDT

Holistic Approach for a Secure Last Line of Defense (Sponsored Session)
For the first time, a safety system (Triconex) from the company Schneider Electric is compromised. The plant shut down. HIMA takes the incident very seriously and deeply analyzes the information available. HIMA reviews its own processes and products based on the security agencies' recommendations. The diversity between the Schneider and HIMA systems, the results of the security analysis carried out by Dragos as well as their different design philosophy suggest that the TRITON attack is not directly deployable among other vendors systems.

Speakers
avatar for Friedhelm Best

Friedhelm Best

Vice President Asia Pacific Region, HIMA Asia Pacific
Friedhelm Best is Vice President of the Asia Pacific Region at HIMA, a leading independent provider of solutions for safety-critical applications.  Friedhelm previously worked as Director of Global Key Account Management Industry in the Electrical Sector of Eaton Corporation. Friedhelm... Read More →


Thursday April 26, 2018 2:15pm - 3:00pm PDT
Olivia

3:00pm PDT

Changing Threats: Gear up for the Internet of City Things
The world is gearing up for a revolution that will likely be as game-changing as the invention of the automobile 120 years ago. Automation has the potential to fundamentally change our transportation systems, the way we build cities and the way we work and live our lives. The potential benefits are enormous, but there will likely be painful side effects that we need to anticipate and be prepared to address.

Speakers
avatar for Jonathan Lee

Jonathan Lee

TSE – APAC, Pelco by Schneider Electric.


Thursday April 26, 2018 3:00pm - 3:45pm PDT
Olivia

4:00pm PDT

IACS Security Assessment; Things that We might Overlook
Almost all organizations conduct security assessment or security audits for their IACS setup, either internally of from third party consultants. This paper will cover these critical information that may be missed out by IT security specialist and IACS engineers. This paper will also provide the experience of conducting a security assessment for IACS, and to emphasize the critical scopes that might be missed out by the assessor.

Speakers
avatar for Muhammad Reza Shariff

Muhammad Reza Shariff

Cyber Security Practitioner
Rezza is a highly motivated professional with 14 years of experience in IT and information security for Oil & Gas and healthcare industry which includes knowledge on Plant Control System (PCS), Data Control System (DCS) and Supervisory Control and Data Acquisition (SCADA).He first... Read More →


Thursday April 26, 2018 4:00pm - 4:45pm PDT
Olivia
 
Filter sessions
Apply filters to sessions.