The FIRST Energy Symposium was held in 28-29th October 2013 in Lansdowne Resort, Leesburg, VA, US.
FIRST Symposium
(ISC)² Forensics Course
FIRST Symposium
TRANSITS Course
FIRST Symposium | (ISC)² Forensics Course | |
---|---|---|
06:30 – 09:00 | Breakfast | |
07:00 – 09:00 | Registration | |
09:00 – 09:15 | Welcome Remarks | |
09:15 – 10:15 | Managing Industrial Control System Cyber Risks Mark BRISTOW (ICS-CERT) | |
10:15 – 11:15 | The SCADA That Didn't Cry Wolf: Who's Really Attacking Your ICS Devices Kyle WILHOIT (TrendMicro) | |
11:15 – 11:30 | Networking and Coffee Break | |
11:30 – 12:15 | NGRID: The Challenges of Creating and Coordinating Cyber Response at a Critical National Infrastructure | |
12:15 – 13:30 | Lunch | |
13:20 – 14:15 | Evidence Based Risk Management and Incident Response Jake KOUNS (Risk Based Security) | |
13:30 – 15:00 | (ISC)² Breakout - Half Day: Forensics | |
14:15 – 15:00 | PACS-WG: Lessons Learned and Future Work in the Energy Sector Mr. Jack WHITTSITT (NESCO), Mr. Gal SHPANTZER (Energysec) | |
15:00 – 15:15 | Networking and Coffee Break | |
15:15 – 16:45 | IR: The Good, The Bad & The Ugly Mr. David BALCAR (IOActive) | (ISC)² Breakout - Half Day: Forensics 15:15 – 17:30 |
16:45 – 17:00 | Closing Remarks |
FIRST Symposium | TRANSITS Course | |
---|---|---|
06:30 – 09:00 | Breakfast | |
08:00 – 09:00 | Registration | |
09:00 – 09:10 | Welcome Remarks | TRANSITS Course 09:00 – 11:00 |
09:10 – 10:00 | Building a Global Knowledge Network for Energy Security Mr. Chris BLASK (ICS-ISAC) | |
10:00 – 11:00 | Pragmatic Approaches to Developing IR Programs in Small and Medium-Sized Electric Sector Entities Mr. Jack WHITTSITT (NESCO), Mr. Gal SHPANTZER (Energysec) | |
11:00 – 11:15 | Networking and Coffee Break | |
11:15 – 12:00 | SmartGrid NGRID, Mr. Ron DIORIO (NGRID) | TRANSITS Course |
12:00 – 13:30 | Lunch | |
13:30 – 14:15 | Changes in the Threat Landscape and the Potential Impacts to Incident Response Activities Mr. Thaddeus MANN (IBM) | TRANSITS Course 13:30 – 15:00 |
14:15 – 15:00 | iOS Security for Incident Responders Ken VAN WYK (KRvW Associates, LLC) | |
15:00 – 15:15 | Networking and Coffee Break | |
15:15 – 16:00 | How Sharing Threat Intelligence Mitigates Cyber Risks: Real World Examples Mr. Jonathan GIBBS (Cyber Squared) | TRANSITS Course 15:15 – 17:00 |
16:00 – 16:45 | The State of Cyber Espionage: APT & the Energy Sector Mr. Steven ADAIR (Shadowserver Foundation) | |
16:45 – 17:00 | Closing Remarks |
Mr. Thaddeus MANN (IBM)
October 29, 2013 13:30-14:15
MD5: 115280c9dd52c09d5877db56dd8eb479
Format: application/pdf
Last Update: June 7th, 2024
Size: 13.12 Mb
Ken VAN WYK (KRvW Associates, LLC)
October 29, 2013 14:15-15:00
MD5: feff41f1ab8dd1b4147beab7b50a568e
Format: application/pdf
Last Update: June 7th, 2024
Size: 6.32 Mb
Mr. Jack WHITTSITT (NESCO), Mr. Gal SHPANTZER (Energysec)
October 28, 2013 14:15-15:00
MD5: 22724fed5ba7a102b538c3e13161adf3
Format: application/pdf
Last Update: June 7th, 2024
Size: 1.53 Mb