#
Title
RETURN TO OVERVIEW PAGE
2020-07-21
Cyber Security of Control Systems: The Second Coming of the Maginot Line (1:02:02)
SCADA & ICS
2020-07-21
ICS Security - The European Perspective (29:18)
2020-07-16
Assessing the security posture of ICS infrastructure using ISA 62443 standard (55:00)
2020-06-09
The Future of ICS Security Products (32:41)
2020-06-04
What Do Really Secure OT/ICS Sites do Differently (1:08:40)
2020-05-13
ICS Security Crucible: Forging Programmatic Armor and Weapons (28:58)
2020-05-11
A Security Analysis of Smart Manufacturing System
2020-03-06
Waterfall - Safe OT Security Monitoring (28:33)
2020-02-29
NIST Recommendations for ICS & IIoT Security (56:11)
2020-02-28
CyberX 2020 Global IOT and ICS Risk Report (28:14)
2020-02-26
SCADA/ICS Inherited Insecurity: From Nuclear Power Plants to Oil Rigs (27:18)
2020-01-31
How Threat Modeling can Influence ICS Security Posture (26:27)
2020-01-17
Introducing MITRE ATT&CK™ for ICS – and Why It Matters (44:34)
2020-01-08
"Man-in-the-SCADA:" Anatomy of Data Integrity Attacks in Industrial Control Systems (56:08)
2020-01-06
When ICS/SCADA Are Compromised (1:00:41)
2019-12-17
Vulnerabilities in EcoStruxure SCADA Software and Modicon PLCs
2019-12-16
One Flaw too Many: Vulnerabilities in SCADA Systems
2019-12-06
The Future of ICS Security Products (30:45
2019-11-21
Develop Your ICS Security Product Mix With The Future In Mind (30:45)
2019-11-19
ICS Security Risk Management and Effective Executive Communication (30:36)
2019-07-31
11 Zero Day Vulnerabilities Impacting VxWorks... Real-Time Operating System (RTOS)
2019-07-29
Secure SCADA and ICS Networks for 2020 (1:02:10)
2019-04-03
Fake cancerous nodes in CT scans... malware trick radiologists
2019-01-31
Pipelines, Power Grid Vulnerable To Cyber Attack By China, Russia (7:32)
2019-01-11
How Russia hacked U.S. power grid
2018
15 predictions for ICS cybersecurity in 2018
2018
2017 GLOBAL ICS & IIOT RISK REPORT (CyberX)
2018
Cyber-attack disrupts printing of major US newspapers
2018
ICS Cyber Security Predictions for 2018 - The Bad, The Ugly, and The Good
2018
Industrial Control Systems Cyber Emergency Response Team (NCCIC)
2018
Manufacturing Anatomy of Attack report (TRAPX)
2018
SCADA/ICS Dangers & Cybersecurity Strategies
2018
Use Case: Critical Infrastructure (Energy) (ODI)
2017
A Pentester's Intro to Attacking ICS/SCADA - Tripp Roybal (34:17)
2017
Critical Infrastructure Defenses Woefully Weak
2017
Deloitte: Oil and Gas Companies Poorly Prepared for Cyber-Attack
2017
Exploring the Unknown Industrial Control System Threat Landscape - Lee & Miller (47:02)
2017
Half of ICS Firms Suffered Security Incident Last Year
2017
How To Make Your Next ICS Security Project Successful - Parsons (31:37)
2017
Industroyer Malware Detected, Linked to Kiev Attack
2017
InfoSecurity Magazine - SCADA Security resources
2017
Multiple Flaws Found in Critical Nuclear Monitoring Equipment
2017
New Form of Cyber-Attack Targets Energy Sector
2017
Practical ICS Security: Lessons Learned from 12,000 Deployments - Yehonatan Kfir (36:14)
2017
SCADA and mobile in the IoT times - Bolshev & Yushkievich (44:44)
2017
SCADAHacker at S4x17: Effective ICS Reliance - Joel Langill (43:22)
2017
Trend Micro - ICS/SCADA security resources
2017
US Officials: Russian Hackers Targeting Nuclear Facilities
2017
White House Advisers Warn of CNI Cyber-9/11
2017
Why Spend More on ICS Cybersecurity? 7 Cyber Scenarios We’ve Never Seen Before
2016
Could hackers turn the lights out? - BBC
2016
First known hacker-caused power outage signals troubling escalation
2016
German nuclear plant hit by computer viruses - BBC News
2016
ICS Security Assessment Methodology, Tools & Tips - Dale Peterson (56:27)
2016
Israel's electric grid targeted by malware, energy minister says
2016
Researchers have discovered a mysterious malware that can dupe operators at an industrial plant
2016
Risk Assessment as Critical Milestone in SCADA ICS Cyber Security Assurance (36:56)
2016
Shell's Approach To ICS Security (30:08)
2016
What’s the Big Deal with Assessing ICS/SCADA? - Jim Gilsinn (56:55)
2015
Using Static Binary Analysis To Find Vulnerabilities And Backdoors In Firmware (47:30)
2010
Exposing SCADA Systems With Shodan