# Title RETURN TO OVERVIEW PAGE
2020-07-21 Cyber Security of Control Systems: The Second Coming of the Maginot Line (1:02:02) SCADA & ICS
2020-07-21 ICS Security - The European Perspective (29:18)
2020-07-16 Assessing the security posture of ICS infrastructure using ISA 62443 standard (55:00)
2020-06-09 The Future of ICS Security Products (32:41)
2020-06-04 What Do Really Secure OT/ICS Sites do Differently (1:08:40)
2020-05-13 ICS Security Crucible: Forging Programmatic Armor and Weapons (28:58)
2020-05-11 A Security Analysis of Smart Manufacturing System
2020-03-06 Waterfall - Safe OT Security Monitoring (28:33)
2020-02-29 NIST Recommendations for ICS & IIoT Security (56:11)
2020-02-28 CyberX 2020 Global IOT and ICS Risk Report (28:14)
2020-02-26 SCADA/ICS Inherited Insecurity: From Nuclear Power Plants to Oil Rigs (27:18)
2020-01-31 How Threat Modeling can Influence ICS Security Posture (26:27)
2020-01-17 Introducing MITRE ATT&CK™ for ICS – and Why It Matters (44:34)
2020-01-08 "Man-in-the-SCADA:" Anatomy of Data Integrity Attacks in Industrial Control Systems (56:08)
2020-01-06 When ICS/SCADA Are Compromised (1:00:41)
2019-12-17 Vulnerabilities in EcoStruxure SCADA Software and Modicon PLCs
2019-12-16 One Flaw too Many: Vulnerabilities in SCADA Systems
2019-12-06 The Future of ICS Security Products (30:45
2019-11-21 Develop Your ICS Security Product Mix With The Future In Mind (30:45)
2019-11-19 ICS Security Risk Management and Effective Executive Communication (30:36)
2019-07-31 11 Zero Day Vulnerabilities Impacting VxWorks... Real-Time Operating System (RTOS)
2019-07-29 Secure SCADA and ICS Networks for 2020 (1:02:10)
2019-04-03 Fake cancerous nodes in CT scans... malware trick radiologists
2019-01-31 Pipelines, Power Grid Vulnerable To Cyber Attack By China, Russia (7:32)
2019-01-11 How Russia hacked U.S. power grid
2018 15 predictions for ICS cybersecurity in 2018
2018 2017 GLOBAL ICS & IIOT RISK REPORT (CyberX)
2018 Cyber-attack disrupts printing of major US newspapers
2018 ICS Cyber Security Predictions for 2018 - The Bad, The Ugly, and The Good
2018 Industrial Control Systems Cyber Emergency Response Team (NCCIC)
2018 Manufacturing Anatomy of Attack report (TRAPX)
2018 SCADA/ICS Dangers & Cybersecurity Strategies
2018 Use Case: Critical Infrastructure (Energy) (ODI)
2017 A Pentester's Intro to Attacking ICS/SCADA - Tripp Roybal (34:17)
2017 Critical Infrastructure Defenses Woefully Weak
2017 Deloitte: Oil and Gas Companies Poorly Prepared for Cyber-Attack
2017 Exploring the Unknown Industrial Control System Threat Landscape - Lee & Miller (47:02)
2017 Half of ICS Firms Suffered Security Incident Last Year
2017 How To Make Your Next ICS Security Project Successful - Parsons (31:37)
2017 Industroyer Malware Detected, Linked to Kiev Attack
2017 InfoSecurity Magazine - SCADA Security resources
2017 Multiple Flaws Found in Critical Nuclear Monitoring Equipment
2017 New Form of Cyber-Attack Targets Energy Sector
2017 Practical ICS Security: Lessons Learned from 12,000 Deployments - Yehonatan Kfir (36:14)
2017 SCADA and mobile in the IoT times - Bolshev & Yushkievich (44:44)
2017 SCADAHacker at S4x17: Effective ICS Reliance - Joel Langill (43:22)
2017 Trend Micro - ICS/SCADA security resources
2017 US Officials: Russian Hackers Targeting Nuclear Facilities
2017 White House Advisers Warn of CNI Cyber-9/11
2017 Why Spend More on ICS Cybersecurity? 7 Cyber Scenarios We’ve Never Seen Before
2016 Could hackers turn the lights out? - BBC
2016 First known hacker-caused power outage signals troubling escalation
2016 German nuclear plant hit by computer viruses - BBC News
2016 ICS Security Assessment Methodology, Tools & Tips - Dale Peterson (56:27)
2016 Israel's electric grid targeted by malware, energy minister says
2016 Researchers have discovered a mysterious malware that can dupe operators at an industrial plant
2016 Risk Assessment as Critical Milestone in SCADA ICS Cyber Security Assurance (36:56)
2016 Shell's Approach To ICS Security (30:08)
2016 What’s the Big Deal with Assessing ICS/SCADA? - Jim Gilsinn (56:55)
2015 Using Static Binary Analysis To Find Vulnerabilities And Backdoors In Firmware (47:30)
2010 Exposing SCADA Systems With Shodan