These are the whitepapers and presentations that ICSJWG members submitted in conjunction with the 2013 Fall Meeting in Rockville, MD. These documents are ‘as received’ from the respective authors, who have released them for public distribution but may retain copyrights of the presentation matter. Please contact the authors for additional information regarding specific rights retained. Content and opinions are those of the authors and do not represent DHS opinions, endorsements, or recommendations. The advice and instructions provided in the attached are provided as is, with no warranties, and should be confirmed and tested prior to implementation, as applicable.
Should you wish a copy of any of these, please contact us at ICSJWG@hq.dhs.gov and we will gladly send a copy.
Network Architecture: Important Role in Securing Control Systems
Dr. Art Conklin, Center for Information Security Research and Education, University of Houston
Cybersecurity in the Utilities Sector - Lessons Learned in North America
Prudence Parks, Utilities Telecom Council (UTC)
IT/OT Integration - We know it's Secure, but Is It Safe?
Joel Langill, SCADAhacker.com
Cyber Intelligence Analysis – Best Practices for the ICS Community: A Call for ICSJWG Action
Perry Pederson, U.S. Nuclear Regulatory Commission (NRC)
Security at the Crossroads
Minimizing Risks Associated with Performing Vulnerability Assessments on Industrial Control Systems
Alex Benitez, ComSource, Inc.
I Think, Therefore I Fuzz
Corey Thuen, Southfork Security
Expansion and Convergence: Case Studies on How ICS Security is Being Used to Address Health Care Security Challenges
Mike Ahmadi, Codenomicon Ltd.
Billy Rios, Qualys