U.S. Flag Official website of the Department of Homeland Security
U.S. Department of Homeland Security Seal. ICS-CERT. Industrial Control Systems Cyber Emergency Response Team.
TLP:WHITE

Agenda-Available Presentations 2014 ICSJWG Fall Meeting

The following is a representation of the final agenda at the ICSJWG 2014 Fall Meeting in Idaho Falls, ID.
Presentations released by presenters for distribution are shown in bold. These documents are ‘as received’ from the respective authors, who have released them for public distribution but may retain copyright of some or all of the presentation matter. Please contact the respective author(s) for additional information regarding specific rights retained. Content and opinions are those of the author(s) and do not represent DHS opinions, endorsements, or recommendations.
 
The advice and instructions provided in the attached are provided as is, with no warranties, and should be confirmed and tested prior to implementation, as applicable.
 
Should you wish a copy of any of these, please contact us at ICSJWG.Communications@hq.dhs.gov and we will gladly send a copy.
 
Tuesday, October 7, 2014
 
WELCOME & OPENING REMARKS (Not Available)
Marty Edwards
U.S. Department of Homeland Security
Industrial Control Systems Cyber Emergency Response Team, Director
 
Tim Roxey
North American Electric Reliability Corporation, 
Chief Security Officer
Electricity Sector-Information Sharing and Analysis Center,  Senior Director
 
Neil Hershfield
U.S. Department of Homeland Security
Industrial Control Systems Cyber Emergency Response Team, Deputy Director
 
Keynote Address (Not Available)
Assistant Secretary for Cybersecurity & Communications
Andy Ozment
  
What Is on My Operational Control Network and How Did That Get There? Lessons from a Public Utility Evaluation (Not Available)
Dr. Jonathan Butts, Fox Three
Michael Glover, Fox Three
 
Defense in Depth Designed for Current Risk Models (Available)
Dr. Art Conklin, University of Houston College of Technology
 
Whitelisting vs Blacklisting: Can’t We All Just Get Along? (Available)
Dennis Murphy, Elbit Systems of America
 
How Do I Know If I’ve Already Been Owned? (Available)
Gib Sorebo, Leidos
 
Cybersecurity Procurement Language for Energy Delivery Systems: A New Approach (Available)
Clifford Glantz, Pacific Northwest National Laboratory
 
An International Perspective on Security and Compliance (Available)
Lior Frenkel, Waterfall Security Solutions
Andrew Ginter, Waterfall Security Solutions
 
Lunch & Learn: Grid Reliability and Critical Infrastructure Protection Standards (Not Available)
Dr. Marlene Ladendorff, Idaho National Laboratory
 
Whitelisting Technology Which Considers Attack Vectors and System Complexity on Industrial Control Systems (Available)
Dr. Kuniyasu Suzaki, Japan, National Institute of Advanced Industrial Science and Technology
Makoto Kiuchi, Japan, Control Systems Security Center
Hidenobu Seki, Japan,  Control Systems Security Center
Yoshiaki Komoriya, Japan, Control Systems Security Center
 
Scalability of ICS Cybersecurity: Case Studies, Adaptation of the Purdue Model, and Growth Path for Large Scale, Multi-Site Production Facilities (Available)
Michael Coden, NextNine
Pete MacLeod, Accenture
 
Impacts on ICS Security from using the Oil and Natural Gas Cybersecurity Capability Maturity Model (Not Available)
Jim Linn, American Gas Association
Walt Grudzinski, Vectren Corporation
Rob Mims, AGL Resources
 
Demonstration: ICS Interactive Missions (Not Available)
Matthew Luallen, CYBATI
 
Wednesday, October 8, 2014
 
Day 2 Welcome & Opening Remarks (Not Available)
Neil Hershfield
U.S. Department of Homeland Security
ICS-CERT, Deputy Director
 
Keynote Address:  Outgoing Private-Sector ICSJWG Co-Chair (Not Available)
Mike Assante for Tim Roxey, North American Electric Reliability Corporation, Chief Security Officer
 
Unclassified Threat Briefing (Not Available)
Marty Edwards, Director, ICS-CERT
 
Presentation and Demo: Latest Version of the Cybersecurity Evaluation Tool (CSET®) (Not Available)
Barry Hansen, Idaho National Laboratory
 
Lunch & Learn: Demonstration of the Newest CSET® Tool with DODI 8500/8510 and NIST SP 800-82 (Available)
Dr. Michael Chipley, PMC Group
 
Should Critical ICS Be Managed Through Mobile Devices? Attack Tree Analysis May Provide the Answer (Available)
Terry Ingoldsby, Amenaza Technologies
 
Resilient Control Systems: Consideration of Diverse Requirements (Not Available)
Dr. Craig Rieger, Idaho National Laboratory
 
Building an ICS Security Framework for Industrial Organizations (Available)
Ernie Hayden, Securicon
 
Simple Techniques – Powerful Results (Not Available)
Sandra Bittner, Arizona Public Service
 
Defining and Analyzing ICS-Specific Vulnerabilities (Not Available)
Sean McBride, Critical Intelligence
 
Follow-up on Japan’s Control Systems Security Center (CSSC) Efforts Since 2012 (Available)
Dr. Kazutaka Matsuzaki, CSSC
Souichi Watanabe, CSSC
Hideaki Kobayashi, CSSC
 
Cybersecurity Return on Investment (Not Available)
Bernie Pella, Schneider Electric
 
Nature of Insider Threat (Available)
Phil M., CPNI UK
 
DHS Science and Technology Discussion on ICS Technology Advancements (Not Available)
Dr. Doug Maughan, DHS / S&T
 
Solving the Cyber-Detection Gap with Physics-Based Integrity Assessment (Available)
Thurston Brooks, PFP Cybersecurity
Alan Hinton, PFP Cybersecurity
 
Demonstration: ICS-Village (Available)
Corey Thuen, Southfork Security
Kenneth Shaw, Southfork Security
Bryan Hatton, Idaho National Laboratory
Anthony Persi, Mandiant
 
Exploit Demonstration (Not Available)
Idaho National Laboratory
 
Whitepaper submitted in conjunction with the Fall Meeting:
 
Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense (Available)
Daniel Harkness, Chris Strasburg, and Scott Pinkerton
Back to Top