Ending Soon! Get a new iPad, Samsung Galaxy Tab A or take $350 Off Your OnDemand or vLive course by May 10!

ICS Security Summit & Training

Orlando, FL | Sun, Mar 19 - Mon, Mar 27, 2017
This event is over,
but there are more training opportunities.

Welcome to ICS Security Summit & Training

Welcome to ICS Security Summit & Training

  • 7 courses
  • 7 instructors
  • 2 disciplines
 

ICS Security Summit

  •   CPE Credits: 16

Pre-Summit Events: March 19, 2017 - Please register for the workshops in advance
Summit Dates: March 20-21, 2017
Training Course Dates: March 22-27, 2017

The 12th Annual Industrial Control Systems Security Summit & Training is the event to attend in 2017 to better understand targeted ICS campaigns and how to protect your organization. The Summit will bring together industry leaders and in-the-field practitioners for two days of in-depth talks and panel discussions, live demonstrations, exclusive networking opportunities, and hands-on challenges! Following the Summit, SANS will host seven world-class information security courses taught by real-word practitioners.

Attacks on control systems that cause physical damage or affect physical processes are no longer limited to theory or speculation. Rather, we've seen several recent high-profile cases where malicious actors have successfully intruded and damaged systems. ICS Security Summit attendees will learn the latest methods and techniques for defending control systems from these very real threats. Prominent ICS practitioners will share new tools and techniques that can be implemented immediately upon returning to work. The Summit provides a perfect environment for sharing ideas and connecting with fellow ICS security professionals.



The ICS Security Summit will address a wide range of topics, including:

  • Understanding what an attack against your organization will look like
  • Live attack demonstrations & the defenses needed to stop them
  • Case studies and success stories
  • System and organizational investment opportunities that reduce attacker effects
  • Future attack vectors on ICS
  • Physical security
  • Mitigations - Defenders, governance, and controls
  • Threats - Attacks, regulators, and auditors
  • Vulnerability research: Statistics and vulnerability vectors

"This summit was extremely beneficial because it gave insight in to what challenges my peers are facing and how they are addressing them. It is a forum for sharing information and cultivating new ideas." - Jeff Jones, Exelon Corporation