The following is a representation of the final agenda at the ICSJWG 2015 Spring Meeting in Washington, DC. Presentations released by presenters for distribution are shown in bold. These documents are ‘as received’ from the respective authors, who have released them for public distribution but may retain copyright of some or all of the presentation matter. Please contact the respective author(s) for additional information regarding specific rights retained. Content and opinions are those of the author(s) and do not represent DHS opinions, endorsements, or recommendations.
The advice and instructions provided in the attached are provided as is, with no warranties, and should be confirmed and tested prior to implementation, as applicable.
Should you wish a copy of any of these, please contact us at ICSJWG.Communications@hq.dhs.gov and we will gladly send a copy.
ICS Cyber Attacks: Fact vs. Fiction and Why It Matters (Robert M. Lee - SANS)
Panel - Emerging Research (Andrew Bochman | Dr. Craig Rieger | Rita Foster | Mary Klett - INL)
Demonstration - How to Design a Multi-Tiered Security Architecture (Francis Cianfrocca - Bayshore Networks)
Cybersecurity: How much is enough? (Andrew Ginter - Waterfall Security Solutions)
Are Second Generation Firewalls Good for Industrial Control Systems? (Bernie Pella - Schneider Electric)
Simplifying the Patch Management Process... Do I Have Your Attention? (Monta Elkins - FoxGuard Solutions)
Demonstration - How to Support Complex Risk Frameworks or Methodologies from a Single Interface Using Off-the-Shelf Tools (Harry Regan | Matthew Bebout - Securicon)