24th-26th April 2018 | London Hilton Canary Wharf

Content Library

Top Featured

ICS Cyber Security: State of the market and expert overview

The number of cyber attacks is on the rise and Industrial Control Systems must be secured, in order for global organisations to avoid suffering real, physical damage.

Ahead of the ICS Cyber Security conference, more than 350 experts from all around the world have answered our recent survey and shared their views on the nature of the cyber threat, implementing solutions and in what time frame and their thoughts on the through-life support offered by the industry.

Improving cyber security for Industrial Control Systems: Rebuilding the OT/IT relationship

Cyber security solutions are in place for industrial control systems, and yet the gap between OT and IT is not addressed, leaving a risk for organisations' cyber security. The challenge now is to mitigate it, by improving the communication between these two departments and assess who is liable for the cyber security.

Ahead of ICS Cyber Security 2018, we had the opportunity to discuss with Andy Oliver, current Project Manager for OT Cyber Security at a major pharma company and speaker at the event, on the need for a OT/IT convergence and what strategy organisations need to implement to ensure the digital safety of their organisation.


How mature is your cyber security?

Cyber security solutions are already in place in various sectors to secure ICS from attacks, but assaults keep happening. This poses now the challenge to assess whether these solutions are enough to protect both digital and physical assets.

Ahead of the ICS Cyber Security conference, we recently surveyed more than 350 experts on their views on the maturity of their cyber security and balanced their answers with an expert insight from Professor Chris Hankin, co-Director of the Institute for Security Science and Technology at the Imperial College London and speaker at the conference.

28 Solutions to the Cross-Sector ICS Nightmare

In February 2017, two researchers at the Georgia Institute of Technology simulated a cyber attack on a water treatment plant. Using ransomware, the academics managed to access programmable logic controllers (PLCs) to shut off valves, increase the chlorine content of water and show false information on computer displays.

The ICS world is riddled with weaknesses that are ready to be exploited by switched-on wrongdoers for currency and chaos. In this analysis we look at five of the most dangerous roots of ICS breach and how to best prevent them.


Industrial OT-IT Convergence: Is It Really Inevitable?

At last year’s Cyber Security for ICS Europe conference, one of the liveliest topics of discussion considered the widespread segregation of IT (information technology) and OT (operational technology) departments, and the prospects for convergence.

As the list of questions surrounding this issue grows, many experts involved in ICS are doing what they can to guide others towards convergence before the risks become overwhelming. This article offers a few of those perspectives ahead of the 2016 event. 

Additional Event Information

2017 ICS Cyber Security Delegate List

As we draw closer to ICS Cyber Security 2017 - we wanted to share a list of organisations that will be in attendance.


Infoposter: Top 10 Cyber Trends in ICS

View the recent research findings from ICS Cyber Security 2015 knowledge partner Frost & Sullivan in this single infoposter.


UK government to fine critical organisations up to £17m if they fail to put in strong cyber security

On the 28th January 2018 th UK government announced that organisations working in critical services like energy, transport, water and health can be fined up to £17 million ($24 million) as a “last resort” if they fail to demonstrate that their cyber security systems are equipped adequately against attacks. Read the full press release here


Cyber 9/11: Is The Oil & Gas Industry Sleepwalking Into A Nightmare?

Cyber Security within the oil and gas industry is a threat that is, in many cases, being ignored. It has a direct effect in the creation of government regulation and legislation, can have deep financial impact and – in some cases – can even cost lives.
The 2014 Verizon Data Breach report states that 40% of the attacks performed in the manufacturing and mining industry are cyber espionage based. A UK survey revealed that 81% of large companies were digitally attacked, at an average cost of £1 million per company. Similarly, 62 per cent of small and medium-sized enterprises (SMEs) were digitally attacked in 2014 at an average cost of more than £100,000 per incident.
Cyber 9-11 is coming, and it’s a “when” and not “if” scenario. It is debatable whether anybody can be totally prepared for an event of such magnitude, but our research has shown that the oil and gas industry is unfortunately often unprepared in its basic prevention and mitigation abilities.
Eventually, even your company will be a target and the cost of unpreparedness could be crippling.
In this 15 page Oil & Gas IQ report we examine the current state of Oil and Gas Cyber Security and the mammoth price of not being prepared.

Top 10 Cyber Trends Affecting the CNI Sector

Anthony Leather, Senior Consultant for Aerospace, Defense and Security at Frost & Sullivan, presents the top 10 cyber threats facing critical national infrastructure based on detailed analysis of the most recent incidents. According to Leather, the cyber threat will be the number one risk for the next 20 years. Governments and industry must engage with the cyber threat now in a more strategic and meaningful way than has so far been achieved.

Industrial Control Systems and Process Control Networks Cybersecurity Assessment

As industrial control systems (ICS) and process control network (PCN) environments become more connected, “security by obscurity” is no longer an adequate strategy. Sophisticated adversaries have begun to take notice of vulnerabilities found in today’s operational environments. The ICS/PCN Cybersecurity Assessment evaluates technology and network defense processes to measure the overall corporate risk, identify risk mitigation opportunities, and improve control system security.

Top Featured

The ICS Threat Matrix: “Software only as safe as the last patch”

2016 saw cyber criminals continue to become ever smarter, more efficient and increasingly successful at penetrating industrial networks. Industrial control systems (ICS) operators reported more security incidents to their governing authorities than in any year to date. In this video, we talk to cyber security experts about the biggest problems they perceive in the arena now and in the near future, for the critical infrastructure that underpins so much of daily life.


Security wake-up call for European critical infrastructure

From the 'cyber attack' on Ukraine assets to power generation problems in the UK, incidents this year have already underscored the potential damage that an unexpected incident can place on a nation’s critical national infrastructure and calls into question whether enough is being done when it comes to resilience and emergency measures. Read more on how Europe is being reshaped to respond to the threats...

Critical Infrastructure - Why the lack of debate?

There was much talk about defence in the run up to last year’s UK General Election. Today, the issues surrounding Trident, border security and the developing issues in the Middle East remain points of public contention. However, there still seems to be no debate about the United Kingdom’s defence and internal protection of its infrastructure and assets. National Security expert Malcolm Warr discusses the elephant in the room...

Collaboration on Critical National Infrastructure Cybersecurity Key to Minimising UK Economic Risk (New Study)

A significant cyberattack across the UK’s critical national infrastructure could have far-reaching and significant economic impacts for Britain according to a study carried out by the Cambridge Centre for Risk Studies at the University of Cambridge Judge Business School. The report, developed in conjunction with Lockheed Martin, Integrated Infrastructure: Cyber Resiliency in Society, models the potential impact of a coordinated and sustained cyberattack on one of the UK’s regional power distribution networks and the likely short and long term costs to the UK economy.

Digital Danger: How Do You Build An Effective Cyber Strategy For Oil & Gas?

From the technical to the cultural, there a many risks associated with digitizing upstream oil processes. As David Joy, Senior Project Integration at Weatherford explains in the following interview, Cyber threats exists that can be managed if you stay ahead of them – read below to find out the elements that go into building and maintaining a robust and proactive cyber security strategy:   Highlight the range of technological and cultural risks associated with going digital. Technological risks: Company intellectual property, trade secrets, etc. typically are more accessible to a larger audience when stored and accessed via digital methods. Digital surveillance and gathering/storage of personal data is pushing the limits of individual privacy concerns, and increasing the corporate liability for privacy breaches. Cultural risks: Global staff possesses varying degrees of knowledge about cyber-security, the importance of safeguarding company intellectual property, etc. –