Alexander Nochvay
Summit
The fall of CODESYS
Andreas Erdich
Summit
Applying the Consequence-driven Cyber-informed Engineering method on a Facility for a Successful Attack
Andy Greenberg
Keynote
Sandworm: Lessons From the Ukrainian Cyberwar and Beyond
Anton Shipulin
Expo
How to save $1.7 million over three years on industrial cybersecurity: the Results of the Forrester Total Economic (TEI) Impact study
Cdr Michael Widmann
Summit
What is the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE)?
Christian Augustat
Summit
Tales from Industrial Plants and Responders
Christopher Corbett
Summit
Automotive DoIP and forensic analysis for automotive systems
Daniel Stenberg
Summit
curl - the world's most used software component?
Didrik Ehrenborg
Summit
EU STRIKE3 project
Dieter Sarrazyn
Summit
Security Testing for ICS Owners 2.0
Erik Biverot
Summit
A view from the Blue side of Locked Shields
Erik Hjelmvik
Summit
TLS Interception and Decryption *LIVE DEMO*
Henrik Sandberg
Expo
Testbed Evaluation of DoS Attacks on Continuously Controlled Processes
Herman Geijer
Dinner
Zombie Survival
Janek Pelzer
Summit
Introduction to Malcolm
Jarkko Huttunen
Summit
Presenting how we know what’s happening in the exercise and measuring
Jens Wiesner
Summit
Applying the Consequence-driven Cyber-informed Engineering method on a Facility for a Successful Attack
Jimmy Wylie
Summit
Broken Rungs: A look at popular ladder logic runtime privileges
Johan Nilsson
Summit
A view from the Blue side of Locked Shields
Jonathan Jogenfors
Summit
Digital Forensics and ICS: Why and how?
Kevin Gomez Buquerin
Summit
Automotive DoIP and forensic analysis for automotive systems
Khalid Ansari
Summit
Secure your MES - the bridge between IT and OT
Magnus Lundgren
Expo
We are all vulnerable
Marina Krotofil
Summit
IT vs. OT: We are Much More Similar than We are Different. Comparing Process Control Room and SOC operations
Markus Mahrla
Summit
Fuzz Testing IEC 61850
Matan Dobrushin
Summit
Project RunAway
Mathias Ekstedt
Expo
Applying automated attack modeling to a smart grid use case
Michael Weng
Expo
Cyber Security for OT/IIoT/ICS – what we have learned 1000 installations later
Mike Dodson
Summit
When will my PLC support Mirai? The security economics of large-scale attacks against ICS
Mona Lange
Summit
Tales from Industrial Plants and Responders
Monta Elkins
Summit
Nation-State Supply Chain Attacks for Dummies and You Too
Nicklas Keijser
Summit
SCADApocalypse Now 4.0?
Ragnar Sundblad
Summit
Building a distributed and robust time synchronisation service
Reid Wightman
Summit
Broken Rungs: A look at popular ladder logic runtime privileges
Richard Widh
Summit
Demystifying TSCM or how to spot the witch doctor doing the raindance
Rikard Bodforss
Summit
Ultra responsible disclosure – or how to deal with a 0-day in critical infrastructure
Robert Bearsby
Expo
Attack Path Mapping
Robert Lagerström
Expo
Project EnergyShield - hacking the power grid as a research method
Sandra Bardón
Summit
Red Teams view from the exercise
Sarah Fluchs
Summit
Layered Blueprints – an ontology and method for (talking about) engineering OT Security
Silver Saks
Summit
Digging into the technical setup of the exercise
Stephen Hilt
Summit
How we reverse-engineered multiple industrial radio remote-control systems
Thomas Svensson
Summit
Introduction to Locked Shields exercise
Torstein Gimnes Are
Keynote
The cyber-attack on Hydro
Ulf Frisk
Summit
Memory Forensics and DMA Attacks with MemProcFS and PCILeech
Yoav Flint Rosenfeld
Summit
Project RunAway