Sign up or log in to bookmark your favorites and sync them to your phone or calendar.
Lunch - Clove Restaurant 12:30pm - 1:30pm
How Can Organizations Gain Situa... 1:30pm - 2:00pm
RF Exploitation: Demystifying Io... 2:00pm - 2:30pm
ICS/SCADA – 0Day & Fileless Malw... 2:30pm - 3:00pm
Fast-Tracking Defense-in-Depth i... 3:15pm - 3:45pm
Using OSINT Technology for Pen-testing Critical... 3:45pm - 4:30pm
Anatomy of an Attack: Two Real-W... 4:30pm - 5:00pm
Cybersecurity for Safe, Reliable... 1:30pm - 2:00pm
Reducing Industrial Cybersecurit... 2:00pm - 2:30pm
Cyber Security and Seaport Autom... 2:30pm - 3:00pm
Lessons Learned From Securing Cr... 3:15pm - 3:45pm
[Panel] Relevance of ISO/IEC 62443 Standards in... 3:45pm - 4:30pm
Emerging Cyber Security Legislat... 4:30pm - 5:00pm
Breakfast and Registration 7:30am - 8:45am
Morning Break
Afternoon Break
Cocktail & Dinner Reception (5PM - 7PM) 5:00pm - 7:00pm
Welcome to Securit...
Getting Practical On Addressing Industrial Cyber... 9:00am - 9:45am
ICS is Everywhere: Pervasive Risks – but Defense... 9:45am - 10:30am
Securing the Field: a View from the F... 10:45am - 11:20am
Analyzing GreyEnergy Malware: From Maldoc... 11:20am - 12:00pm
Discovering and Defending Agains... 12:00pm - 12:30pm
Conference Party Overlooking Singapore 5:00pm - 7:00pm
Lunch - Clove Restaurant 12:15pm - 1:25pm
Securing Critical Infrastructure... 1:30pm - 2:00pm
Technical Reference on Autonomou... 2:00pm - 2:30pm
Technical Reference on Autonomou... 2:30pm - 3:00pm
IACS Security Audit - Why We Fai... 3:00pm - 3:30pm
Targeted Attacks and Security Te... 3:45pm - 4:15pm
The “Late Mover’s” Advantage in Marit... 4:15pm - 4:50pm
Closing Remarks
Lessons for Successful Industria... 1:30pm - 2:00pm
OT Security: Examples of IACS Se... 2:00pm - 2:30pm
Industrial Insecurity by Design 2:30pm - 3:00pm
Incident Response in Your Contro... 3:00pm - 3:30pm
Establishing Best Practice in th... 3:45pm - 4:15pm
Protecting the Systems that Power Our... 4:15pm - 4:50pm
Breakfast and Registration 7:00am - 8:30am
Opening Remarks -...
Threat Detection and Response: What’s... 8:45am - 9:20am
I Own Your Building (Management Syste... 9:20am - 9:55am
Demystifying Machine Learning Analyti... 9:55am - 10:30am
TRITON Attribution: Russian Government-Owned Res... 10:45am - 11:30am
[Panel] ICS Incident Response or Incident Handli... 11:30am - 12:15pm
ADVANCED TRAINING DAY (Registration Required) 7:30am - 5:00pm
Advanced ICS/IIoT Security 1-Day Training (8AM-5PM) [$] 8:00am - 5:00pm
Managing Industrial Cybersecurity from the Plant Floor to the Business Floor (8AM-5PM) [$] 8:00am - 5:00pm
ICS Red Team/Blue Team Training (8AM-5PM) [$] 8:00am - 5:00pm
Lunch - Clove Restaurant 12:15pm - 1:15pm