Back to Archive The Archive - Presentations Contact us
2014 2019

Presentations

Here you can view all the best international speakers and traineers attending CS3STHLM during the years. We also host a dinner entertainment slot during the Gala Dinner.

Filter

  • All
  • Expo
  • Dinner
  • Keynote
  • Summit

2019

46 Presentations

Alexander Nochvay

Summit

The fall of CODESYS

Andreas Erdich

Summit

Applying the Consequence-driven Cyber-informed Engineering method on a Facility for a Successful Attack

Andy Greenberg

Keynote

Sandworm: Lessons From the Ukrainian Cyberwar and Beyond

Anton Shipulin

Expo

How to save $1.7 million over three years on industrial cybersecurity: the Results of the Forrester Total Economic (TEI) Impact study

Cdr Michael Widmann

Summit

What is the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE)?

Christian Augustat

Summit

Tales from Industrial Plants and Responders

Christopher Corbett

Summit

Automotive DoIP and forensic analysis for automotive systems

Daniel Stenberg

Summit

curl - the world's most used software component?

Didrik Ehrenborg

Summit

EU STRIKE3 project

Dieter Sarrazyn

Summit

Security Testing for ICS Owners 2.0

Erik Biverot

Summit

A view from the Blue side of Locked Shields

Erik Hjelmvik

Summit

TLS Interception and Decryption *LIVE DEMO*

Henrik Sandberg

Expo

Testbed Evaluation of DoS Attacks on Continuously Controlled Processes

Herman Geijer

Dinner

Zombie Survival

Janek Pelzer

Summit

Introduction to Malcolm

Jarkko Huttunen

Summit

Presenting how we know what’s happening in the exercise and measuring

Jens Wiesner

Summit

Applying the Consequence-driven Cyber-informed Engineering method on a Facility for a Successful Attack

Jimmy Wylie

Summit

Broken Rungs: A look at popular ladder logic runtime privileges

Johan Nilsson

Summit

A view from the Blue side of Locked Shields

Jonathan Jogenfors

Summit

Digital Forensics and ICS: Why and how?

Kevin Gomez Buquerin

Summit

Automotive DoIP and forensic analysis for automotive systems

Khalid Ansari

Summit

Secure your MES - the bridge between IT and OT

Magnus Lundgren

Expo

We are all vulnerable

Marina Krotofil

Summit

IT vs. OT: We are Much More Similar than We are Different. Comparing Process Control Room and SOC operations

Markus Mahrla

Summit

Fuzz Testing IEC 61850

Matan Dobrushin

Summit

Project RunAway

Mathias Ekstedt

Expo

Applying automated attack modeling to a smart grid use case

Michael Weng

Expo

Cyber Security for OT/IIoT/ICS – what we have learned 1000 installations later

Mike Dodson

Summit

When will my PLC support Mirai? The security economics of large-scale attacks against ICS

Mona Lange

Summit

Tales from Industrial Plants and Responders

Monta Elkins

Summit

Nation-State Supply Chain Attacks for Dummies and You Too

Nicklas Keijser

Summit

SCADApocalypse Now 4.0?

Ragnar Sundblad

Summit

Building a distributed and robust time synchronisation service

Reid Wightman

Summit

Broken Rungs: A look at popular ladder logic runtime privileges

Richard Widh

Summit

Demystifying TSCM or how to spot the witch doctor doing the raindance

Rikard Bodforss

Summit

Ultra responsible disclosure – or how to deal with a 0-day in critical infrastructure

Robert Bearsby

Expo

Attack Path Mapping

Robert Lagerström

Expo

Project EnergyShield - hacking the power grid as a research method

Sandra Bardón

Summit

Red Teams view from the exercise

Sarah Fluchs

Summit

Layered Blueprints – an ontology and method for (talking about) engineering OT Security

Silver Saks

Summit

Digging into the technical setup of the exercise

Stephen Hilt

Summit

How we reverse-engineered multiple industrial radio remote-control systems

Thomas Svensson

Summit

Introduction to Locked Shields exercise

Torstein Gimnes Are

Keynote

The cyber-attack on Hydro

Ulf Frisk

Summit

Memory Forensics and DMA Attacks with MemProcFS and PCILeech

Yoav Flint Rosenfeld

Summit

Project RunAway

2018

34 Presentations

Anton Shipulin

Expo

Kaspersky Industrial Cybersecurity approach

Ben Miller

Summit

Hunting and Responding in ICS

Cheng Lei

Summit

Attacking PLCs by PLC in deep

Dan Gunter

Summit

Stateful Protocol Hunting

Daniel Michaud-Soucy

Summit

Stateful Protocol Hunting

Dieter Sarrazyn

Summit

Operator Jail breakout

Dr Kevin Jones

Expo

ICS cyber security in the face of digital transformation

Erik Zouave

Summit

Supply Chain Cyber Security throughout the ICS Lifecycle

Erwin Kooi

Summit

The good, the bad and the segmented

Frank Lycops

Summit

Operator Jail breakout

György Dán

Expo

Resilient Computing and Communication for Critical Infrastructures

Henrik Sandberg

Expo

Control Theory for Practical Cyber-Physical Security

Jack Werner

Dinner

Fake news or folklore?

Jannis Utz

Expo

Recorded Future - The Dark Web’s deep threat intelligence secrets

Joe Slowik

Summit

Indicators vs. Anomalies vs. Behaviors: A Critical Examination for ICS Defense

Jonas Almroth

Expo

Designing a second generation cyber range

Jonas Dellenvall

Expo

Security when failure is not an option

Jonathan Homer

Summit

Recent APT Campaign targeting Energy Sector Assets

Kai Thomsen

Summit

Attacking Cars Revisited: On the Road Towards a More Resilient Connected Vehicle Infrastructure

Kristina Blomqvist

Summit

Introduction to MSB-session

Lars Erik Smevold

Summit

Introduction to KRAFT-CERT and some words about Nordic co-op

Lars Westerdahl

Summit

Uncertain conflict – When critical infrastructure is affected by national conflicts.

Mads Dam

Expo

Securing Low Level Software Using Formal Methods

Marcin Dudek

Summit

Using fake BTS as a part of pentest of devices using SIM cards for data transmission

Margarita Jaitner

Summit

IoT-related risks

Mark Bristow

Summit

ICS Incident Response: Lessions and mitigations from the field

Mark Stacey

Summit

Hunting and Responding in ICS

Summit

Incident Response: Learning as you go is Expensive

Monta Elkins

Summit

Jumping Air Gaps

Omer Zohar

Summit

Unblockable Chains - Is Blockchain the ultimate malicious infrastructure?

Patrick Miller

Keynote

Industrial Technology Trajectory: Running With Scissors

Ragnar Thobaben

Expo

Securing Wireless Transmissions at the Air Interface

Rick K. Peters

Expo

Addressing Physical to Digital Convergence in an Evolving World

Rik van Hees

Summit

The good, the bad and the segmented

William Middleton

Summit

Securing the ICS lab network

2017

20 Presentations

Adam Crain

Summit

Secure SCADA Protocol for the 21st Century (SSP21)

Akriti Srivastava

Summit

S in IoT is for Security

Ali Abbasi

Summit

Configurable Code-Reuse Attacks Mitigation for COTS Programmable Logic Controller Binaries

Anton Cherepanov

Summit

Industroyer: biggest threat to industrial control systems since Stuxnet

Dan Demeter

Summit

Back to the IoT Future

Dieter Sarrazyn

Summit

DIY insider threat detection/prevention within ICS enviroments

Jenny Radcliffe

Dinner

Adventures in social engineering - tales of a "people hack"

Jens Wiesner

Summit

Security for Safety: Fortifying the last line of defense

Jessikka Aro

Summit

Pro-Kremlin trolls, fake news and propagandists as opinion influencers - and how to counter them

Joe Slowik

Summit

Strategic Network Defense in ICS Environments

Jon Rogeberg

Summit

APT Case Study

Lars Erik Smevold

Summit

Pandora´s box

Martin Eian

Summit

APT Case Study

Melissa Crawford

Summit

ICS Program Development for Multi-national Corporations

Oleksii Yasynskyi

Summit

Cyberattacks Against Critical Infrastructure in Ukraine: Taxonomy, Consequences, Lessons Learned

Paraskevi Kasse

Summit

Network and Information Security Directive: the road ahead

Summit

Threat modelling and security measures for ICS/SCADA systems in critical infrastructure

Patrick DeSantis

Summit

From Box to Backdoor: Using Old School Tools and Techniques to Discover Backdoors in Modern Devices

Robert Lipovský

Summit

Industroyer: biggest threat to industrial control systems since Stuxnet

Roman Sologub

Summit

Cyberattacks Against Critical Infrastructure in Ukraine: Taxonomy, Consequences, Lessons Learned

Rossella Mattioli

Summit

Protecting European transport infrastructures: threat models

Summit

IoT in Europe: what could possibly go wrong and how you can fix

Summit

ENISA Trainings for Cyber Security Specialists

2016

26 Presentations

Anton Cherepanov

Summit

BlackEnergy – What We Really Know About the Notorious Cyber-Attacks

Arnaud Soullié

Summit

DYODE: Do Your Own DiodE

Ary Kokos

Summit

DYODE: Do Your Own DiodE

Christer Fuglesang

Dinner

Voyage to Space

Eireann Leverett

Summit

Embodied Vulnerabilities - How to find, fix, and think about them

Erik Westring

Summit

Crate City

Erwin Kooi

Summit

In a grid operator's security trenches

Frode Hommedal

Summit

The Cyber Threat Intelligence Matrix: A simple incident response decision model

Henrik Sandberg

Summit

Physics-based attack detection and countermeasures in control systems

Isabel Skierka

Summit

Too many cooks spoil the broth?

Jan-Peter Kleinhans

Summit

Too many cooks spoil the broth?

Jens Zerbst

Summit

Defense-in-Depth' in a time of advanced persistent threats

Ken van Wyk

Summit

Building Robust Tabletop Exercises to Strengthen Your CSIRT

Lucas Lundgren

Summit

LIGHTWEIGHT PROTOCOL! SERIOUS EQUIPMENT! CRITICAL IMPLICATIONS!

Maik Brüggemann

Summit

PLC-Blaster - A Worm Living in Your PLC

Margrete Raaum

Summit

Road to Cyber Threat Intelligence in the Energy Sector

Marie Moe

Summit

Embodied Vulnerabilities - How to find, fix, and think about them

Paraskevi Kasse

Summit

Cybersecurity in Europe - the NIS Directive and the role of Operators of essential services

Peter Andersson

Summit

Crate City

Robert Guanciale

Summit

Breaking isolation using cache attributes

Robert Lipovský

Summit

BlackEnergy – What We Really Know About the Notorious Cyber-Attacks

Robert M. Lee

Keynote

Exploring the Unknown ICS Threat Landscape

Rossella Mattioli

Summit

Cybersecurity in Europe - the NIS Directive and the role of Operators of essential services

Simin Nadjm-Tehrani

Summit

The role of anomaly detection in industrial control systems

Thomas Schreck

Summit

Road to Cyber Threat Intelligence in the Energy Sector

Vidar Hedtjärn Swaling

Summit

Ageing of ICS - What's the deal?

2015

18 Presentations

Ahmed Sherif Eldemrdash

Summit

Simulating Attacks on infrastructure systems in Egypt

Arjan Meijer

Summit

Is Your Plant "Ready to Crash"?

Chris Sistrunk

Summit

Missing the Obvious: Network Security Monitoring for ICS

Dewan Chowdhury

Summit

Hacking the Power Grid: Analyzing what Hackers do when they have access to the 'Power Grid Honeypot'

Eireann Leverett

Summit

Caststonomics: North

Freddy DeZeure

Summit

What can the ICS sector learn from APT attack?

Jan Seidl

Summit

PhysICS - Using physics simulation engine to demonstrate impacts on industrial control attacks

Summit

Reducing attack surface on ICS with Windows native solutions

Joe Fitzpatrick

Summit

The dirty secrets your hardware can keep, and how we can clean up its act

Kim Zetter

Keynote

Stuxnet and Beyond: The Age of Digital Warfare

Leif Nixon

Summit

Responsible Disclosure may be Irresponisble

Mark Fabro

Summit

Case Studies in Real World ICS/SCADA Incident Response and Forensics

Michael Toecker

Summit

Digital Maintenance and Test Equipment and Impact on Control System Security

Mikael Vingaard

Summit

Who controls your industrial control systems?

Monnappa K A

Summit

Reversing and Deciphering the Cyber Espionage Malware Communications

Peter Zinn

Dinner

Cyber Security through the ages

Robert Caldwell

Summit

Missing the Obvious: Network Security Monitoring for ICS

Robert M. Lee

Summit

Asset Identification and Network Security Monitoring in ICS Network

Stephen Hilt

Summit

The Little Pump Gauge That Could: Attacks Against Gas Pump Monitoring Systems

2014

12 Presentations

Anders Rodrick

Summit

Experiences from introducing security network monitoring at a major ICS enviroment

Erik Hjelmvik

Summit

SCADA Network Forensics

Joel Langill

Keynote

What aren't we doing right? ... or is that 'What are we doing wrong?'

John Matherly

Summit

Conversations with your Control System

Justin Lowe

Summit

A best practice framework for managing ICS risks

Margrete Raaum

Summit

Information Security Incident Response in the Energy Sector

Ruben Santamarta

Summit

SATCOM Terminals: Hacking by Air, Sea and Land

Samuel Linares

Summit

Beyond Public Private Partnerships: Collaboration, Coordination and Commitment as key aspects of Industrial Cybersecurity

Sergey Gordeychic

Summit

SCADA StrangeLove: The Great Train Cyber Robbery

Staffan Persson

Summit

Security requirements and their implications. An interpretation of the german security requirements for smart meters for manufacturers and operators

Stefan Lueders

Keynote

Why Control System Cyber Security Sucks

Vyacheslav Borilin

Summit

Cyber Security, or Cyber Safety Culture? How to convert the weakest link into the force