The Cyber Senate Industrial Control Cybersecurity Nuclear conference consists of presentations and debate from some of the Nuclear energy industry’s leading end users from Operational and IT backgrounds, Government influencers, leading cybersecurity authorities and some of the world’s most influential solution providers.
As Operational Technology (OT) environments become increasingly interconnected and smarter, organizations face significant digital transformation challenges. The business demand for the raw data and information produced by OT systems is growing exponentially both from an internal and external perspective. As the demand for data increases, so has the volume of cyber-attacks specifically aimed at OT system. Cyber-attacks are becoming more advanced and have the potential to impact a number of aspects of a company’s business including safety, health and environment, production operations, information integrity, financial performance and reputation.
For a company looking to harden their OT environment, identifying where to begin can often be a confusing and difficult process. Before embarking on an OT hardening project, for example by either implementing costly technical solutions or introducing new OT specific policies and procedures, leaders need take a step back and ask themselves if they understand, or have thought about, the “BASICs” of OT.
In this session, Leidos Cyber Expert, Scott Keenan, will explain Leidos’ view of OT “BASICS” which provides organizations with the foundation necessary to build a OT hardening project.
Warrington chosen to host international nuclear conference
2nd annual Industrial Control Cybersecurity Nuclear Summit to take place in Birchwood
Warrington is set to host the second annual Industrial Control Cybersecurity Nuclear Summit on 22nd – 24th May 2017.
Taking place at The Centre, Birchwood Park, the two-day conference will cover pressing cyber security challenges in the nuclear industry, including managing supply chains, preparing for the Internet of Things (IoT) and what public/private partnerships could mean for the sector.
The event, which is aimed at an international audience, will be structured around presentations and debate from some of the world’s leading cyber security experts and authorities in nuclear security.
Past presenters have included the IAEA, ONR, NDA, BEIS, Engie, Lockheed Martin, Airbus, Horizon Nuclear, EDF and Honeywell.
Discussing the conference, event organiser James Nesbitt, Founder of the Cyber Senate said: “The security landscape is changing and the way we protect the safety, reliability and stability of our critical nuclear infrastructure must change with it.
“This event will address several key areas such as how to reduce vulnerability, detect threats and how IT and operational technology can work in synergy to defend nuclear assets. It will also cover wider issues in the industry, such as the growing skills gap. We’ve brought together an impressive range of world experts on these topics who will be sharing best practice and providing insight as to what the future may hold for this sector.”
“Warrington is home to a number of organisations in the nuclear industry, including Sellafield Ltd, AMEC Nuclear, NNL and Rolls Royce Nuclear, so holding the conference here felt like a natural step. These are big issues that affect not just the security of businesses, but of whole nations and events like these are an important way to share best practice and plan for the future.”
For more information, visit: https://www.industrialcontrolsecuritynuclear.com/
The Cyber Senate are pleased to announce the IAEA will be joining us as Key Note presenters on the Industrial Control Cyber Security Nuclear conference we will be hosting in Warrington UK, May 24-25th 2016.
For further information see www.industrialcontrolsecuritynuclear.com
According to reports by Symantec, their research team have observed a “multi-staged, targeted attack campaign against energy companies around the world, with a focus on the Middle East” between January and February.
The Trojan.Laziok as its referred is targeting energy companies with the intent of obtaining trade secrets.
“A new information stealer,” as they are calling it, “acts as a reconnaissance tool allowing attackers to gather information and tailor their attack methods for each compromised computer.”
The Cyber Senate highly recommends that Energy firms take note of this information. Further details can be found on Symantec’s website http://www.symantec.com/connect/blogs/new-reconnaissance-threat-trojanlaziok-targets-energy-sector