Fall 2014 Conference (#SARACon)

The ICS-ISAC Fall Conference provides a forum for learning solutions to Cyber-Physical and Control System cybersecurity  challenges. The agenda is based on the four components of the Situational Awareness Reference Architecture (SARA): Identity, Inventory, Activity, and Sharing.

Platinum Sponsors


Gold Sponsors


Silver Sponsors

NexDefense Metal White BKG PNG (transparent)CyberIQ_Logo_OnWhite_CMYK

 Media Partners

         InfoSecBuzz Square Buzz Logo     

Date: September 17-20, 2014


GTRI   Georgia Tech Research Institute, Atlanta, Georgia


Cybersecurity issues – such as the DHS release of Operation Aurora information; legislation like CISA (S. 2588), CIRDA (H.R. 2952) & H.R. 3696; and the NIST Cybersecurity Framework — can leave one wondering “What, where, how and with whom should I share?” and “Where can I find solutions?

At the ICS-ISAC Fall Conference you will develop knowledge you can take to further enhance your organization’s cybersecurity posture through answers to these and many other questions including:

    •         What do I do with the NIST Cybersecurity Framework?
    •         How does my organization plug in to a real-time threat intel stream?
    •         How can I enhance my cyber skills and that of my organization?
    •         Inventory?  What inventory?
    •         What is Avalanche?
    •         What is this STIX/TAXII thing I have been hearing about?
    •         How do I participate more fully in information sharing?

On Wednesday-Friday hear panel discussions and presentations from national and international leadership who will provide sound guidance for facility operators, integrators and solution providers.

Then on Saturday join one of three education and training tracks:

1. TRANSITS training – learn how to develop an Incident Response capability through FIRST’s TRANSITS (Training of Network Security Incident Teams Staff) program

2. ICS-ISAC hosted training for professional & industry participants – learn how to structure and execute a cybersecurity plan

3. 1NTERRUPT Cyber Defense Challenge – GTRI and the ICS-ISAC will host a day of workforce development for secondary students.

Register now for this event and learn how to advance your organizational goals and achieve your mission.  Attendees, Speakers, and members of the Press can register at the bottom of this page.


DAY 1 — Wednesday (Sept 17th)
  7:30-8:30 Breakfast
  8:30-8:45 Session Opening Remarks
  8:45-9:15 Advancing the State of Situational Awareness
  9:15-9:30 Introduction to Organizational Identity
Presented by: Dr Fred Cohen
  9:30-10:30 Organizational Identity
10:30-11:00 Networking Break
11:00-11:45 Cyber Insurance Panel
11:45-1:15 Lunch
  1:15-2:15 Workforce Development
  2:15-3:15 NIST Framework
  3:15-3:30 Networking Break
  3:30-4:30 Establishing and Managing Facility Inventory
  4:30-5:30 Gaining & Applying Available Knowledge
  5:30-8:00 Dinner
DAY 2 — Thursday (Sept 18th)
  7:30-8:30 Breakfast
  8:30-8:45 Session Opening Remarks
  8:45-9:45 Building National Situational Awareness
  9:45-10:30 Validation Test of Evidence Preservation on Realtime OS
Presented by: Kensuke Tamura
10:30-11:00 Networking Break
11:00-12:00 Evolutions in Situational Awareness
12:00-1:30 Waterfall Security Lunch & Learn
  1:30-2:00 DOE Briefing
Presented by: Carol Hawk
  2:00-2:30 Cyber-Physical Modeling & Simulation for Situational Awareness (CYMSA)
Presented by: Sakis Meliopoulos
  2:30-3:15 Retrospective on an Incident in Energy
Presented by: Mounir Kamal
  3:15-3:45 Networking Break
  3:45-4:30 NERC’s GridEx Program
Presented by: Bill Lawrence
  4:30-5:30 ICS-ISAC Board
  5:30-8:00 Dinner
DAY 3 — Friday (Sept 19th)
  7:30-8:30 Breakfast
  8:30-8:45 Session Opening Remarks
  8:45-9:30 Avalanche and the Global Knowledge Network
  9:30-10:30 Globalization of Incidence Response
10:30-11:00 Networking Break
11:00-12:00 Evolution of Threat Intelligence
12:00-12:30 Conference Summary & Wrap-up
12:30 Lunch
1:30-5:00 Roundtable — Moving Forward with Situational Awareness


DAY 4 — Saturday (Sept 20th)
1NTERRUPT Track Professional Track TRANSITs Track
7:30-8:00 Check-in Check-in Check-in
8:00-8:30 Opening Remarks Opening Remarks Opening Remarks
8:30-9:15 1NT A-1 Introduction to Security Management for Critical Infrastructure Organizational Issues
9:15-10:00 1NT A-2 Using Avalanche for Real-Time Information Sharing
Organizational Issues (con’t)
10:00-10:30 Break Break Break
10:30-11:15 1NT B-1 Establishing Facility Awareness with Sophia Operational Processes
11:15-12:00 1NT B-2 Virtual SCADA Environment for Simulation and Cybersecurity Experiments
Operational Processes (con’t)
12:00-1:00 Lunch Lunch Lunch
1:00-1:45 1NT C-1 Implementing a Secure Control System Design Technical Module
1:45-2:30 1NT C-2 Ecosystem for Critical Infrastructure Products
Technical Module (con’t)
2:30-3:00 Break Break - 2:15 end TRANSITS Track -
3:00-3:45 1NT D-1 Secrets Management      —
3:45-4:30 1NT D-2 Applied Threat Intelligence      —
4:30-5:00 Closing Remarks Closing Remarks      —


      waterfall  NexDefense Metal White BKG PNG (transparent)


Customized Sponsorship packages starting for as little as $3,000.

Download the Sponsorship Guide

Register to Attend:

Credentialed members of the press may request a press pass by contacting the Event Organizer using the link on the Eventbrite page.

Leave a Reply