U.S. Flag Official website of the Department of Homeland Security

ICSJWG 2011 Fall Conference Presentations

These documents are ‘as received’ from the respective authors, who have released them for public distribution but may retain copyrights of the presentation matter. Please contact the authors for additional information regarding specific rights retained. Content and opinions are those of the authors and do not represent DHS opinions, endorsements, or recommendations. The advice and instructions provided in the attached are provided as is, with no warranties, and should be confirmed and tested prior to implementation, as applicable.

Should you wish a copy of any of the approved presentations, please contact us at ICSJWG@hq.dhs.gov and we will gladly forward a copy to you.

Smart Grid Interoperability Panel - Cyber Security Working Group
Brian Lenane

Implementing a Network-based Intrusion Detection System for Control Systems
Joel Langill

Cyber Security and the New Frontier: Lessons Learned
Stacey Kelly

ISASecure Certification for Systems
Graham Speak & Kevin Staggs

IEEE 1711-2010 Security for Legacy SCADA Protocols
Tracy Amaio & Tien Van

Improving Security Operations through ES-ISAC
Ben Miller

Top-Down Regulation
Perry Pederson

ICSJWG-A NERC Perspective
Brian M. Harrell

Extending Data Security in Legacy SCADA Systems
Jamey Hilleary

Risk Analysis and Measurement with CWRAF
Robert Martin

Preventing Cascading Event(s): A Distributed Cyber-Physical Approach
Josef Allen

Securing Network Perimeters - How Operations & IT Can Benefit
Ron Mraz

A Complex Journey to a Simple Future
Tim Roxey, North American Electric Reliability Corporation

Cyber Security Implications of SIS Integration with Control Networks
Zachary Tudor, Program Director, SRI International

Using Architectural Analysis Tools for Better Protection Decisions
Fred Cohen

Securing Control and Communications in Rail Transit
David Teumim

Maintaining Necessary Information Paths over Unidirectional Gateways
Mohan Ramanathan &
Andrew Ginter

Software Assurance - Making the Software Ecosystem Rugged
Richard Struse

A Baseline Security Standard for Industrial Automation Control Systems
Mike Ahmadi &
Dennis Holstein

Hardening the Active Perimeter of Industrial Control Networks
James Graham

Secure Validation Methodologies for ICS Patching
Mark Trump

Control System Security Vulnerabilities - Collaborative Mitigation
Ernest Rakaczky

Effective Disclosure
Dale Peterson

Military Considerations in ICS Vulnerability Reporting
Lt. Col. W. Andrew Pennington

Design Principles for Secure Smart Grid System Integration across Network Perimeters
Sitaraman Lakshminarayanan

Measuring the Security of Industrial Control Systems in the Age of Stuxnet
Doron Becker

Secure Data Transfer from Lower to Higher Security Levels
Bernie Pella



 

Back to Top