Back to Archive The Archive - Keynotes Contact us
2014 2019

Keynotes

Here you can view all the best international speakers and traineers attending CS3STHLM during the years. We also host a dinner entertainment slot during the Gala Dinner.

2019

Sandworm: Lessons From the Ukrainian Cyberwar and Beyond

Andy Greenberg

Andy Greenberg

Senior Writer at Wired

Back in 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world’s largest businesses – from drug manufacturers to software developers to shipping companies.

At the attack’s epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage – the largest, most devastating cyberattack the world had ever seen.

The cyber-attack on Hydro

Torstein Gimnes Are

Torstein Gimnes Are

Digital Marshall & CISO at Norsk Hydro

Back in 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world’s largest businesses – from drug manufacturers to software developers to shipping companies.

At the attack’s epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage – the largest, most devastating cyberattack the world had ever seen.

2018

Industrial Technology Trajectory: Running With Scissors

Patrick Miller

Patrick Miller

Managing Partner at Archer

Innovative and disruptive technologies are enhancing and invading our traditional industrial business model. Future infrastructure organizations will need more data to operate efficiently and succeed in the brave new interconnected world.

The diversity of new technologies and data will fuel more diversity in business opportunity. Everyone expects more OT, more IOT, and more IT - and all of it is supposed to be highly reliable and secure.

These factors (and more) lead to a landscape shift for the industrial cybersecurity risk profile. In this session, hear ways to recognize the problems and gain some clarity on possible solutions through historic lessons, made up words, and practical front-line experience.

2016

Exploring the Unknown ICS Threat Landscape

Robert M. Lee

Robert M. Lee

Security Researcher at Dragos Inc.

The ICS threat landscape is mostly unknown. We have a lot of stories of attacks but most are hyped up. And from trusted sources we have metrics on incidents but they tell a very different story than intended sometimes. In this presentation, the current ICS threat landscape will be explored, deficiencies in it will be explained, and recommendations for the community will be given to help ensure we shine a light on a dark corner in the community.

2015

Stuxnet and Beyond: The Age of Digital Warfare

Kim Zetter

Kim Zetter

Investigating Journalist at Wired

Kim Zetter is an award-winning investigative journalist and author who covers cybersecurity, cybercrime, cyber warfare, and civil liberties. She has been covering computer security and the hacking underground since 1999, first for PC World magazine, and now for Wired, where she has been reporting since 2003 and is currently a senior staff writer. She has broken numerous stories over the years about hacking, WikiLeaks, and NSA surveillance and has three times been voted one of the top 10 security reporters in the nation by her journalism peers and security industry professionals.

In 2006 she broke a story for Salon.com about a secret NSA room at an AT&T facility in Missouri that was believed to be siphoning internet data from the telecom’s network operations center.

In 2007 she wrote a groundbreaking three-part story for Wired on the cybercriminal underground, which exposed the world of online carding markets and the players behind them.

In 2010, she and a Wired colleague broke the story about the arrest of Bradley Manning, the former Army intelligence analyst accused of leaking millions of classified U.S. government documents to WikiLeaks.

In 2011, she wrote an extensive feature about Stuxnet, a sophisticated digital weapon that was launched by the U.S. and Israel to sabotage Iran’s uranium enrichment program. She recently completed a book on the topic titled Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon published by Crown/Random House in November 2014.

2014

Why Control System Cyber Security Sucks

Stefan Lueders

Stefan Lueders

Head of IT Security at CERN