- Coming soon
23 September 2019
Erwin Paternotte & Mattijs van Ommeren will not be presenting their "It WISN't Me: Attacking Industrial Wireless Mesh Networks (part II)" due to other pressing obligations.
17 October 2019
Prasanna N will not be presenting their "CVSS for ICS; Gauging a tennis game with number of goals".
The fall of CODESYS
Applying the Consequence-driven Cyber-informed Engineering method on a Facility for a Successful Attack
Sandworm: Lessons From the Ukrainian Cyberwar and Beyond
What is the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE)?
Cdr Michael Widmann
Tales from Industrial Plants and Responders.
Automotive DoIP and forensic analysis for automotive systems
Kevin Gomez Buquerin
curl - the world's most used software component?
EU STRIKE3 project
Security Testing for ICS Owners 2.0
TLS Interception and Decryption *LIVE DEMO*
A view from the Blue side of Locked Shields
Introduction to Malcolm
Presenting how we know what’s happening in the exercise and measuring
Broken Rungs: A look at popular ladder logic runtime privileges
Digital Forensics and ICS: Why and how?
Secure your MES - the bridge between IT and OT
IT vs. OT: We are Much More Similar than We are Different. Comparing Process Control Room and SOC operations
Fuzz Testing IEC 61850
Yoav Flint Rosenfeld
When will my PLC support Mirai? The security economics of large-scale attacks against ICS
Nation-State Supply Chain Attacks for Dummies and You Too
SCADApocalypse Now 4.0?
Building a distributed and robust time synchronisation service
Demystifying TSCM or how to spot the witch doctor doing the raindance
Ultra responsible disclosure – or how to deal with a 0-day in critical infrastructure
Red Teams view from the exercise
Layered Blueprints – an ontology and method for (talking about) engineering OT Security
Digging into the technical setup of the exercise
How we reverse-engineered multiple industrial radio remote-control systems
Introduction to Locked Shields exercise
The cyber-attack on Hydro
Torstein Gimnes Are
Memory Forensics and DMA Attacks with MemProcFS and PCILeech