Be aware

The following information is tied to the 2017 CS3STHLM Summit.

Speakers & Trainers

World Class Content

CS3STHLM – the Stockholm international summit on Cyber Security in SCADA and Industrial Control Systems - is an annual summit that gather the most important stakeholders across critical processes and industries. CS3STHLM has been organized since 2014, and has quickly become the premier ICS Security Summit in Northern Europe!

SpeakerUS

Adam Crain

Speaker

Adam Crain

Software Engineer

  • Automatak
  • United States

Adam is a software engineer, security researcher, and open source advocate. In 2012, he started his own venture, Automatak, to improve the adoption of robust open source software (OSS) in the utility space. He is the principal author of opendnp3, an implementation of IEEE 1815 (DNP3). Since April 2013, vulnerabilities have been identified in products sold by more than twenty vendors. Adam works with vendors, utilities, government agencies, standards bodies, and industry organizations to identify and solve systemic issues.

Close

SpeakerIN

Akriti Srivastava

Speaker

Akriti Srivastava

Security Researcher

  • Adobe Systems
  • India

Akriti is a security researcher working with Adobe Systems, blogger, web application security, APIs security, IOT security and Network security enthusiast. Involved in multiple responsible disclosure of critical vulnerabilities and listed in various hall of fame including Google, developed various CTFs on Web Services and IOT for multiple conferences.

Close

SpeakerIR

Ali Abbasi

Speaker

Ali Abbasi

Ph.D. candidate

  • University of Twente, Netherlands
  • Iran

Ali Abbasi is a Ph.D. candidate in Distributed and Embedded System Security group at the University of Twente, The Netherlands and visiting Ph.D. researcher at the Chair of Systems Security of Ruhr-University Bochum, Germany. His research interest involves embedded systems security mostly related to Industrial Control Systems, Critical Infrastructure Security, and Real-Time Operating Systems security. He received his master degree in Computer Science from Tsinghua University, Beijing, China in 2013. He was working there on Programmable Logic Controller (PLC) security in Network Security Lab, Microprocessor and SoC Technology R&D Center with the National 863 High-tech Program grant from Ministry of Industry and Information Technology of China. He is currently doing his research at the Chair of Systems Security of Ruhr-University Bochum regarding designing binary-level protection mechanisms to battle against the sophisticated memory corruption and code-reuse attacks against PLCs and other critical real-time embedded systems.

Close

ModeratorSE

Anne-Marie Eklund Löwinder

Moderator

Anne-Marie Eklund Löwinder

Chief Information Security Officer

  • IIS, The Internet Foundation In Sweden
  • Sweden

She is the Chief Information Security Officer at IIS, The Internet Foundation In Sweden. She also serves on the boards of internet-related organisations including the Council of European National Top Level Domain Registries (CENTR) and the Swedish Law and Informatics Research Institute. Eklund Löwinder has been appointed Trusted Community Representative by the Internet Corporation for Assigned Names and Numbers (ICANN). She is one of seven people who control the DNSSEC key generation for the internet root zone.

Close

SpeakerSK

Anton Cherepanov

Speaker

Anton Cherepanov

Senior Malware Researcher

  • ESET
  • Slovakia

Anton Cherepanov currently working at ESET as a malware researcher, his responsibilities include the analysis of complex threats. His research was presented on numerous conferences, including Virus Bulletin, CARO Workshop, PHDays, and ZeroNights. His interests focus on IT security, reverse engineering and malware analysis automation.

Close

SpeakerRO

Dan Demeter

Speaker

Dan Demeter

Security Researcher

  • Kaspersky Labs
  • Romania

Dan graduated from Imperial College London and holds a Master of Engineering in Software Engineering. He joined Kaspersky Lab in 2014 where his work focuses on developing threat intelligence systems, processing big data and creating new technologies to fight advanced persistent threats.

Presentation

Back to the IoT Future
Close

SpeakerBE

Dieter Sarrazyn

Speaker

Dieter Sarrazyn

Security Expert

  • Secudea bvba
  • Belgium

Dieter is a security expert who systematically aims to find vulnerabilities and weaknesses within IT and OT information systems for hackers to exploit. He has built his career in industrial environments and has gained excellent knowledge on strategic, tactical and operational level regarding security related subjects. He works extensively on industrial control system security including more than 8 years in a large electricity generation company. He deploys this expertise primarily in an Operational Technology (OT) environment, performing SCADA security assessments and securing SCADA environments. These activities are always part of a larger program, aimed at reducing business risks.

Close

WorkshopSE

Erik Hjelmvik

Workshop

Erik Hjelmvik

Network Analyst

  • NETRESEC
  • Sweden

Erik is the creator of NetworkMiner and an experienced incident handler who has specialized in the field of network forensics.

Close

SpeakerGB

Jenny Radcliffe

Speaker

Jenny Radcliffe

Social Engineering Expert

  • Great Britain

Jenny Radcliffe – aka “The People Hacker” – is an expert in Social Engineering (the human element of security), negotiations, non-verbal communication and deception, using her skills to help clients from corporations and law enforcement, to poker players, politicians and the security industry protect themselves from malicious social engineering attacks.

Close

SpeakerDE

Jens Wiesner

Speaker

Jens Wiesner

Dipl. Phys.

  • German Federal Office for Information Security (BSI)
  • Germany

Jens Wiesner heads the section “Cyber Security in Industrial Control Systems” in the German Federal Office for Information Security (BSI). He and his team focus on non-standard IT-systems known as OT/ICS/SCADA as well as life-critical systems used in safety or medical domain. They advise other sections of BSI as well as external working groups, manufacturers, integrators and operators of OT especially in critical infrastructures.

Close

SpeakerFI

Jessikka Aro

Speaker

Jessikka Aro

Investigative Reporter

  • Yle Kioski
  • Finland

Jessikka Aro is an awarded investigative reporter with Finnish Broadcasting Company's social media project Yle Kioski. Aro specializes in Russia, extremism and information warfare. In 2014 she became the target of serious and still ongoing international propaganda and hate speech campaign after reporting about pro-Kremlin social media trolls. Currently Aro writes an investigative book about Kremlin's information warfare and trains reporters and general public to recognize and counter online disinformation. Aro is also lobbying for better legislation to counter hybrid threats and protect citizens from state-sponsored online security threats.

Close

SpeakerUS

Joe Slowik

Speaker

Joe Slowik

Network Defender

  • Dragos Inc
  • United States

Joe Slowik has extensive network security and computer network operations experience spanning the military, intelligence, and nuclear communities. Joe served as an Information Warfare Officer in the US Navy from 2009 to 2014, where he brought cybersecurity and network operations experience to places as varied as the mountains of Afghanistan to the Pacific Ocean. Following his military service, Joe moved to Los Alamos National Laboratory (LANL), working as a threat and malware analyst and leading the incident response team. While at LANL, Joe led efforts to completely revise threat hunting and intelligence operations to make network security more agile and responsive to the threat environment, such as tracking network infrastructure creation and malware development by nation state actors of interest. Joe joined Dragos Inc in April 2017 to focus his research and efforts on the ICS threat landscape, where he now applies his passion for defense to the critical infrastructure and industrial control ecosystem.

Close

SpeakerNO

Jon Røgeberg

Speaker

Jon Røgeberg

Manager

  • mnemonic IRT
  • Norway

Jon Røgeberg works as the Manager for mnemonic’s Threat Intelligence group. He is also the Operational Manager of mnemonic IRT and responsible for Forensics in mnemonic. He has 10 years’ experience with Incident Response ranging from virus outbreaks, opportunistic crime, targeted crime and advanced targeted attacks.

Presentation

APT Case Study
Close

SpeakerNO

Lars Erik Smevold

Speaker

Lars Erik Smevold

Senior Security Analyst

  • KraftCERT
  • Norway

Lars Erik Smevold is a senior security analyst in KraftCERT. KraftCERT is the Norwegian energy sector and ICS CERT - a non profit incident response team. The focus for KraftCERT is to together with the companies, protect, detect and recover from incidents that may harm production or distribution of power or water. Lars Erik has many years of experience in the industry from the automation, telco business, and later from security in the energy sector - including the building of security operations center (SOC). In his spare time he enjoys experimenting in his lab.

Presentation

Pandora´s Box
Close

SpeakerNO

Martin Eian

Speaker

Martin Eian

Senior Security Analyst

  • mnemonic IRT
  • Norway

Dr. Martin Eian works as a Senior Security Analyst in mnemonic's Threat Intelligence group, and he is the Project Manager for the research project "Semi-Automated Cyber Threat Intelligence". He has more than 15 years of work experience in IT security, IT operations, and information security research roles. He is also a member of the Europol EC3 Advisory Group on Internet Security. He holds a PhD in Telematics/Information Security from the Norwegian University of Science and Technology (NTNU).

Presentation

APT Case Study
Close

SpeakerUS

Melissa Crawford

Speaker

Melissa Crawford

Global Consultant

  • Siemens
  • United States

After earning the B.S. in Nuclear Engineering from the University of Florida, Melissa started 8 years ago working with Siemens on the design and security of Instrumentation & Control projects for nuclear power plants around the world. She has since taken this detailed knowledge of the I&C systems into her role as Global Consultant for cybersecurity of the industrial control systems at the headquarters for Siemens Plant Security Services, specializing in development of cybersecurity strategies for multinational corporations and remote incident handling.

Close

WorkshopNL

Michael Theuerzeit

Workshop

Michael Theuerzeit

Cyber Security Consultant

  • Hudson Cybertec
  • Netherlands

Michael is a seasoned consultant, specialized in Cyber Security for the Operational Technology (OT). For Cyber Security Solution Provider Hudson Cybertec, he is actively engaged in Industrial Automation and Control Systems (IACS) security projects worldwide. His focus is on cyber security for critical Infrastructure sectors like Nuclear, Oil & Gas, Water and Food. He worked with some of the largest companies operating in critical infrastructure sectors, as well as with government and government agencies, enterprises and EPC contractors. He is also an experienced lecturer and Subject Matter Expert for IEC 62443 and an accomplished speaker at international security events, conferences and seminars.

Close

WorkshopDK

Mikael Vingaard

Workshop

Mikael Vingaard

Preparedness coordinator, IT

  • EnergiNet
  • Denmark

Mikael Vingaard leverages his 15+ years of IT-security experience to build practicalinformation security with a real-life perspective. Mikael works as IT-Security Consultant at EnergiNet.dk, the Danish national transmission system operator. In his spare time, Mikael runs several research projects, build on Open Source softwareto make a positive difference to secure critical infrastructure environments.

Close

SpeakerUA

Oleksii Yasynskyi

Speaker

Oleksii Yasynskyi

Cybersecurity Expert

  • ISSP Labs
  • Ukraine

Oleksii is Cybersecurity expert with more than 20 years hands-on experience in the field. Oleksii participated in many complex technological projects, headed Security Operations Centre and acted as CISO in Enterprise-scale companies. Within a team of ISSP Labs experts, he made a deep research of cyber-attacks against critical infrastructure of Ukraine. Due to his hard work and high level of competence, it was possible to study each step of the attacks in detail, determine the specifics of the attack and develop a range of behavioral patterns to identify targeted attacks, similar to the ones that occurred in Ukrainian cyberspace in the past few years. Regarding this topic, Oleksii published a number of articles and case studies.

Close

SpeakerEU

Paraskevi Kasse

Speaker

Paraskevi Kasse

Network and Information Security Officer

  • ENISA
  • Europe

Her work in ENISA focuses on enhancing the cybersecurity posture of utilities in Energy sector (Electricity, Oil and Gas). Furthermore, she is dealing with security aspects of ICS/SCADA systems and cybersecurity aspects related to energy sector in the European NIS Directive. Paraskevi has been awarded a diploma in computer engineering and informatics, she holds a Msc in Information Science and Technology. Prior to joining ENISA, she worked as a security expert for 7 years at the Hellenic National CERT.

Close

SpeakerUS

Patrick DeSantis

Speaker

Patrick DeSantis

Senior Security Researcher Engineer

  • Cisco Talos
  • USA

Patrick DeSantis is a security researcher with Cisco Talos and focuses his efforts on discovery and exploitation of vulnerabilities in technologies that have an impact on the physical world, such as Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA), Internet of Things (IoT), and anything else that looks like it's asking to be hacked. Patrick's background includes work in both the public and private sectors, as well as a pile of information security certifications and a few college degrees.

Close

SpeakerSK

Robert Lipovský

Speaker

Robert Lipovský

Senior Malware Researcher

  • ESET
  • Slovakia

Robert Lipovsky is Senior Malware Researcher in ESET’s Security Research Laboratory, working for ESET since 2007. He is responsible for malware intelligence and research and leads the Malware Research team in Bratislava. He is a regular speaker at security conferences, including Virus Bulletin, EICAR, and CARO. He runs a reverse engineering course at the Slovak University of Technology, his alma mater and the Comenius University. When not bound to a keyboard, he enjoys sports, playing guitar and flying an airplane.

Close

SpeakerUA

Roman Sologub

Speaker

Roman Sologub

General Manager & CEO

  • ISSP Group
  • Ukraine

Oleksii is Cybersecurity expert with more than 20 years hands-on experience in the field. Oleksii participated in many complex technological projects, headed Security Operations Centre and acted as CISO in Enterprise-scale companies. Within a team of ISSP Labs experts, he made a deep research of cyber-attacks against critical infrastructure of Ukraine. Due to his hard work and high level of competence, it was possible to study each step of the attacks in detail, determine the specifics of the attack and develop a range of behavioral patterns to identify targeted attacks, similar to the ones that occurred in Ukrainian cyberspace in the past few years. Regarding this topic, Oleksii published a number of articles and case studies.

Close

SpeakerEU

Rossella Mattioli

Speaker

Rossella Mattioli

Officer in Network and Information Security

  • ENISA
  • Europe

Rossella Mattioli joined ENISA, the European Union Agency for Network and Information Security, in 2013 and has over 10 years of experience in the IT industry. Her work focuses on promoting cyber security for Critical Infrastructures, IoT and transport infrastructures in Europe. Along the thematic reports and community engagement, she coordinates also ENISA’s expert groups related to Internet infrastructure, IoT, ICS/SCADA, Intelligent public transport and smart car cybersecurity. She holds a MSc in Engineering with main specialization in Cybersecurity at Tallinn University of Technology and she is a Certified Information Systems Security Professional.

Close