Aviation Cyber Security Conference London | Cyber security for aviation, airlines, airports, air traffic control and ANSP's

critical infrastructure

5th Annual Industrial Control Cyber Security USA

Protecting essential services and control systems networks are imperative and in many cases neglected in relation to embedded systems in modern architecture. The proliferation and advancement of operational technologies and the Internet of Things, the convergence of IT and OT have enhanced operational efficiency but paradoxically has increased the attack surface exponentially across the critical […]

Conference Overview

#AVCIP2018 Mailing List   Protecting essential services and control systems networks in the aviation sector is imperative and in many cases neglected in relation to embedded systems in modern architecture. The proliferation and advancement of operational technologies and the Internet of Things, the convergence of IT and OT have enhanced operational efficiency but paradoxically has […]

Aviation cyber security conference London 2017

Aviation Cybersecurity—Finding Lift, Minimizing Drag by Peter Cooper

Mr Peter Cooper will be presenting on the November 21/22 Aviation Cyber Security Summit held by the Cyber Senate.

Cyber Senate 4th annual Industrial Control Cybersecurity Europe conference

Understandings the BASICS – Optimising your ICS Security Posture

As Operational Technology (OT) environments become increasingly interconnected and smarter, organizations face significant digital transformation challenges. The business demand for the raw data and information produced by OT systems is growing exponentially both from an internal and external perspective. As the demand for data increases, so has the volume of cyber-attacks specifically aimed at OT […]

Cyber Senate 4th annual Industrial Control Cybersecurity Europe conference

Why USB devices are still the #1 source of malware in Industrial Control Systems, presented by Honeywell

This September in London and October in Sacramento, we learn from Honeywell why USB devices are still the #1 source of malware in ICS. This discussion will help you understand how USB devices can pose a threat even without malware, including: o Surprisingly effective HID attacks o More advanced threats posed by rogue network devices, […]

Cyber Senate 4th annual Industrial Control Cybersecurity Europe conference

European Rail Cyber Security Working Group announced

On September 12th the Cyber Senate will be hosting the European Rail Cyber Security Working Group in a roundtable format with discussion groups in the morning and outcomes presented in the afternoon. Capped at 70 participants, this face to face knowledge sharing exercise is specifically designed to assist all stakeholders in the rail ecosystem with […]

IAEA join the ICS Nuclear conference as Key Note speakers

The Cyber Senate are pleased to announce the IAEA will be joining us as Key Note presenters on the Industrial Control Cyber Security Nuclear conference we will be hosting in Warrington UK, May 24-25th 2016. For further information see www.industrialcontrolsecuritynuclear.com

New Trojan based campaign, apparently focused on the Middle East, targeting energy companies and specifically trade secrets.

According to Symantec, “A new information stealer, Trojan.Laziok, acts as a reconnaissance tool allowing attackers to gather information and tailor their attack methods for each compromised computer.” More information can be found on Symantecs blog and we highly suggested familiarising your firm with this latest threat as although it is focused on the Middle East, […]

the Industrial Control Systems Cyber Emergency Response Team received and responded to 245 incidents reported by asset owners and industry partners.

“The Energy Sector led all others again in 2014 with the most reported incidents” Please find the report here https://ics-cert.us-cert.gov/sites/default/files/Monitors/ICS-CERT_Monitor_Sep2014-Feb2015.pdf “Of the total number of incidents reported to ICS-CERT, roughly 55 percent involved advanced persistent threats (APT) or sophisticated actors. Other actor types included hacktivists, insider threats, and criminals. In many cases, the threat actors were […]

The Department of Homeland Security join as Key Note Speakers

The Cyber Senate are pleased to announce Mr Marty Edwards, Director ICS CERT, Department of Homeland Security will be joining us as the Key Note speaker on October 13th and 14th in Sacramento California for the 2nd annual Industrial Control Cyber Security USA conference.  Assistant Deputy Director, National Cybersecurity and Communications Integration Center (NCCIC) Director, […]

Attack on Pakistan Grid leaves 140 million without electricity

According to Skynews, “some 140 million people were left without electricity after a transmission line was attacked, knocking out the national grid.” Power has been restored to much of Pakistan after more than 140 million people were plunged into darkness due to an apparent rebel attack on a key power line. Up to 80% of […]

Common Cyber Attacks: Reducing The Impact – CERT UK

“In GCHQ we continue to see real threats to the UK on a daily basis, and I’m afraid the scale and rate of these attacks shows little sign of abating.” Robert Hannigan Director GCHQ http://goo.gl/2RaCGD

Cyber Security for Communications Based Train Control

We launched our CBTC conference for Engineering Directors in 2014, having noticed and appreciated the vision these leaders possessed in relation to upgrading legacy systems, outdated rolling stock and replacing control systems communication. What really caught my attention, is like Smart Grids, in the name of efficiency ( and in this case increasing capacity infrastructure […]

Operation Dragonfly Imperils Industrial Protocol

By Raj Samani , Jim Walter on Jul 02, 2014 Reblogged with permission orginal article here http://blogs.mcafee.com/mcafee-labs/operation-dragonfly-imperils-industrial-protocol Recent headlines (here and here) may have struck fear into those living near major energy installations due to references about the Stuxnet malware. In 2009, this particular strain of malware caused significant damage to the Nantanz nuclear facility, reportedly destroying a fifth of Iran’s nuclear centrifuges. […]

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close

Newsletter Text

Stay Up To Date On Everything The Cyber Senate Is Doing. Click Here To Sign Up For Our Newsletter Today!