#SARACon


The ICS-ISAC Fall Conference was held Sept 17-20, 2014 & provided a forum for learning solutions to Cyber-Physical and Control System cybersecurity challenges. The agenda was based on the four components of the Situational Awareness Reference Architecture (SARA): Identity, Inventory, Activity, and Sharing.


Platinum Sponsors

first_logo-large_cmyk-125

Gold Sponsors

Lockheed_Martin_Logo(highRes)5050waterfall

Silver Sponsors

NexDefense Metal White BKG PNG (transparent)CyberIQ_Logo_OnWhite_CMYK

Media Partners

InfoSecBuzz Square Buzz Logo

Host:

GTRI


Video recordings and slides will soon be available on this website


Overview:

Cybersecurity issues - such as the DHS release of Operation Aurora information; legislation like CISA (S. 2588), CIRDA (H.R. 2952) & H.R. 3696; and the NIST Cybersecurity Framework — can leave one wondering “What, where, how and with whom should I share?” and “Where can I find solutions?

At the ICS-ISAC Fall Conference attendees developed knowledge to further enhance their organization’s cybersecurity posture through answers to these and many other questions including:

    • What do I do with the NIST Cybersecurity Framework?
    • How does my organization plug in to a real-time threat intel stream?
    • How can I enhance my cyber skills and that of my organization?
    • Inventory? What inventory?
    • What is Avalanche?
    • What is this STIX/TAXII thing I have been hearing about?
    • How do I participate more fully in information sharing?

On Wednesday-Friday attendees heard panel discussions and presentations from national and international leadership who provided sound guidance for facility operators, integrators and solution providers.

Then on Saturday attendees joined one of two education and training tracks:

1. ICS-ISAC hosted training for professional & industry participants

2. 1NTERRUPT Cyber Defense Challenge – GTRI and the ICS-ISAC hosted a day of workforce development for secondary students.

GENERAL SESSIONS:

Advancing the State of Situational Awareness

Identity

Introduction to Organizational Identity

Organizational Identity Panel

Cyber Insurance: Making a Business Case for Security

Cyber Insurance Panel

Workforce Development

NIST Cybersecurity Framework

Inventory

Establishing and Managing Facility Inventory

Activity

Building National Situational Awareness

Validation Test of Evidence Preservation on Realtime OS

Evolutions in Situational Awareness

Lunch & Learn by CyberIQ

DOE Briefing

Cyber-Physical Modeling & Simulation for Situational Awareness (CYMSA)

Retrospective on an Incident in Energy

NERC’s GridEx Program

ICS-ISAC Board

Sharing

Avalanche and the Global Knowledge Network

Globalization of Incidence Response

Evolution of Threat Intelligence

TRAINING SESSIONS:

1NTERRUPT Track

Ýmir Vigfússon

Jason Lancaster

Nick Johnson, Grey H@t

Keith Watson, DC404

Winston Messer

Professional Track

Introduction to Security Management for Critical Infrastructure
Using Avalanche for Real-Time Information Sharing
Virtual SCADA Environment for Simulation and Cybersecurity Experiments
Ecosystem for Critical Infrastructure Products
Secrets Management
Applied Threat Intelligence

 

Customized Sponsorship packages started for as little as $3,000.

Download the Sponsorship Guide.

5 Responses to #SARACon

  1. Pingback: ICS ISAC Fall Conference (#SARACon) | ICS ISACICS ISAC

  2. Pingback: FearlessSecurity’s Dr Fred Cohen to Present at ICS-ISAC Fall Conference | Fearless Security

  3. Pingback: » ICS-ISAC Fall Conference Navigant Research

  4. Pingback: ThreatConnect | Threat Intelligence

  5. Pingback: » Sharing Center Shines Light on Security Threats Navigant Research

Leave a Reply