|By Business Wire||
|July 10, 2014 09:28 AM EDT||
SecurityWeek today announced the official Call for Papers for the 2014 Industrial Control Systems (ICS) Cyber Security Conference, to be held October 20 – 23, 2014 at the Georgia Tech Hotel and Conference Center in Atlanta, Georgia, USA.
Now in its 12th year, the conference is the foremost and longest-running cyber security-focused event series for the industrial control systems sectors.
The conference will cater to the energy, water, utility, chemical, transportation, manufacturing, and other industrial and critical infrastructure organizations.
Produced by SecurityWeek, the conference will address ICS/SCADA topics including protection for SCADA systems, plant control systems, engineering workstations, substation equipment, programmable logic controllers (PLCs), and other field control system devices.
The Conference is unique and has historically focused on control system end-users from various industries and what cyber vulnerabilities mean to control system reliability and safe operation. It also has a history of having discussions of actual ICS cyber incidents.
Through the Call for Papers, a conference committee will accept speaker submissions for possible inclusion in the program at the 2014 ICS Cyber Security Conference.
This year's event features new “In Focus” tracks that will explore very specific subject and industry-specific areas of ICS and be limited to 70 attendees. Main track sessions and keynotes will accommodate 250 attendees.
The conference committee encourages proposals for both main track and In Focus sessions. All sessions are 45 minutes in length including a Q&A.
The Conference Committee is particularly interested in submissions on the following topics: ICS/SCADA cyber incidents, results and observations from ICS/SCADA mitigation measures, results and observations from ICS/SCADA vulnerability assessments, and results and observations from joint IT/ICS projects.
To be considered, interested speakers should submit proposals by email to [email protected] by August 15, 2014.
Submissions must include proposed presentation title, an informative session abstract, including learning objectives for attendees if relevant; and contact information and bio for the submitter.
All speakers must adhere to the 100% vendor neutral / no commercial policy of the conference. If speakers cannot respect this policy, they should not submit a proposal. For questions regarding speaking opportunities please contact the events team at [email protected].
“The IT community and ICS community are now bridging the security gap,” said Joe Weiss, founder of the ICS Cyber Security Conference, which was recently acquired by SecurityWeek. “The value to attendees at the conference is inherent with the robust exchange of technical information, actual incidents, insights and best practices to help protect critical infrastructures from cyber attacks.”
“It has become paramount that critical infrastructures balance the needs of ICS reliability and safety with cyber security,” Weiss added.
Following a sold out event in 2013, the 2014 Conference is expected to attract more than 250 professionals from around the world.
Selected speakers will receive a complimentary full conference pass good for all days of the 2014 Conference.
Plan on Attending the 2014 ICS Cyber Security Conference?
Online registration will be available shortly. For conference registration and sponsorship information please contact SecurityWeek.
Sponsorship and exhibitor opportunities for the 2014 ICS Cyber Security Conference are available. Please contact [email protected] for information.
About the ICS Cyber Security conference:
The ICS Cyber Security Conference is the conference where ICS users, ICS vendors, system security providers and government representatives meet to discuss the latest cyber-incidents, analyze their causes and cooperate on solutions. Since its first edition in 2002, the conference has attracted a continually rising interest as both the stakes of critical infrastructure protection and the distinctiveness of securing ICSs become increasingly apparent.
About Security Week:
The mission of SecurityWeek is to help information security professionals do their jobs better by providing timely and insightful news, information, viewpoints, analysis and experiences from experts in the trenches of information security. With content written by industry professionals and a seasoned news team, SecurityWeek produces and distributes insightful and useful content and data to information security professionals around the globe. Visit www.securityweek.com for more information.
SYS-CON Events announced today that LeaseWeb USA, a cloud Infrastructure-as-a-Service (IaaS) provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LeaseWeb is one of the world's largest hosting brands. The company helps customers define, develop and deploy IT infrastructure tailored to their exact business needs, by combining various kinds cloud solutions.
Jul. 28, 2016 10:45 AM EDT Reads: 1,250
Choosing the right cloud for your workloads is a balancing act that can cost your organization time, money and aggravation - unless you get it right the first time. Economics, speed, performance, accessibility, administrative needs and security all play a vital role in dictating your approach to the cloud. Without knowing the right questions to ask, you could wind up paying for capacity you'll never need or underestimating the resources required to run your applications.
Jul. 28, 2016 10:45 AM EDT Reads: 550
Up until last year, enterprises that were looking into cloud services usually undertook a long-term pilot with one of the large cloud providers, running test and dev workloads in the cloud. With cloud’s transition to mainstream adoption in 2015, and with enterprises migrating more and more workloads into the cloud and in between public and private environments, the single-provider approach must be revisited. In his session at 18th Cloud Expo, Yoav Mor, multi-cloud solution evangelist at Cloudy...
Jul. 28, 2016 10:41 AM EDT
Jul. 28, 2016 10:30 AM EDT Reads: 759
Jul. 28, 2016 10:15 AM EDT Reads: 487
Jul. 28, 2016 10:00 AM EDT Reads: 264
Jul. 28, 2016 09:30 AM EDT Reads: 1,395
Jul. 28, 2016 09:28 AM EDT Reads: 225
Jul. 28, 2016 09:00 AM EDT Reads: 1,604
Jul. 28, 2016 08:30 AM EDT Reads: 1,680
Jul. 28, 2016 08:30 AM EDT Reads: 362
Jul. 28, 2016 07:45 AM EDT Reads: 920
Jul. 28, 2016 07:30 AM EDT Reads: 521
Jul. 28, 2016 07:15 AM EDT Reads: 698
Jul. 28, 2016 06:45 AM EDT Reads: 1,865