The ICS Cyber Security Leaders Awards & Reception

Hosted by Nozomi Networks the evening before the RSA Conference

March 4, 2018, 6:30 pm - 9:00 pm
Pied Piper Bar & Restaurant at The Palace Hotel

Two blocks from Moscone on Market Street in San Francisco

Network with Industry Experts, Asset Owners and Partners

If your schedule is open the evening before the RSA Conference, we'd love for you to join us for networking, dinner and awards. Please let us know if you can join us on March 4th.
6:30-7:30 p.m.: Welcome cocktails, appetizers and networking
7:30-8:00 p.m.: Awards presentations 
8:00 p.m.: Dinner
Complete the form to reserve your spot

Can't make the event? Please email to set up a meeting.

Visit the ICS Village in the RSA Sandbox to attend our featured speaking sessions
The Marriot Marquis, Yerba Buena 8 and 9

1000 Installations Later – Lessons for Successful Industrial Cyber Security

Wednesday, March 6th, 2:30-3:00 p.m. PT

With over 1000 installations at leading utilities, energy, manufacturing, and other industrial companies, Nozomi will share key take aways and best practices from 5 years of field experiences to help organizations pave the way for successful OT visibility and cyber security on a local or global scale.  ICS Cyber security deployments are accelerating at a rapid pace. In this session Nozomi Networks Director of Technical Engineering Michael Dugent will take a deep dive with those on the front lines of innovation and implementations.  You’ll hear the lessons learned and understand the critical success factors for asset owners looking to secure their OT environments.

Analyzing the GreyEnergy Malware: from Maldoc to Backdoor

Thursday, March 7th, 12:30 p.m.-1:00 p.m. PT

The APT group GreyEnergy has been targeting industrial networks in Ukraine and other Eastern European countries for the past several years. The advanced persistent threat(APT)group uses stealth attacks to access various elements of ICS. In this session Nozomi Networks Co-founder Andrea Carcano will tap into the latest research from Nozomi Labs to explain how GreyEnergy’s ability to avoid detection is linked to the way they program their malware. He will detail how GregyEnergy social engineers their way into ICS networks via phishing emails, how their malware is able to cause damage without detection and share a free tool designed to help facilitate further discovery and analysis within the ICS cyber security community.