We are proud to announce the agenda and open registration for the 2010 SCADA Security Scientific Symposium [S4] on January 20-21 in sunny Miami Beach. S4 is a very technical event for the presentation of SCADA security research papers. We give authors one hour to present their paper down to the byte, protocol, mathematics, script, … level. It is not for everyone, but if you are longing for some serious technical content, S4 is for you.
In addition to the two-day S4 event, we have a one-day advanced security training course again this year prior to S4. This year’s training will focus on using and customizing the Bandolier Security Audit Files and the SCADA IDS preprocessors, plugins and signatures.
We have a very detailed agenda document and a description of the training course. And I will blog next week on some of the innovative S4 features and what is new this year.
S4 physical attendance is restricted to 55 people, and 14 of those are speaker. It is a great opportunity to spend time and make relationships with the top researchers and thought leaders.
If you can’t attend in person we have a Virtual Attendee option for those who can’t travel to the event.
As in past years I will be highlighting the presentations in the blog, but here is the agenda at a glance.
Tuesday, January 19th
- Bonus Training: Using and Customizing SCADA Security Tools
Wednesday, January 20th
- Keynote: To Be Announced
- Session 1: Security Testing, Vulnerabilities and Exploits in Operating Systems Used in Control System Field Devices
- Session 2: An Analysis of White Listing Security Solutions and Their Applicability In Control Systems
- Session 3: Enabling Secure Information Exchange From A Less Secure Zone To Control System Zone In A Critical Infrastructure
- Session 4: Leveraging Determinism in Industrial Control Systems for Advanced Anomaly Detection and Reliable Security Configuration
- Session 5: Invited Paper
- Session 6: Addressing Unique Control System Concerns in Wireless Networks: Processor Based Denial of Service Attacks and Recovering from Key Compromise
- S4 Cocktail Reception Overlooking the Intracoastal Waterway
Thursday, January 21st
- Session 7: Security and Reliability of Wireless LAN Protocol Stacks Used in Control Systems
- Session 8: Analyzing The Security of Multicast Messaging in Substation Communication
- Session 9: The Great Debate: “Can Wireless LAN Technologies be Used Securely and Reliably for Critical Control and Monitoring Communications?”
- Session 10: Correlating Risk Events and Process Trends to Improve Reliability
- Session 11: An Analysis of the Use of Host Intrusion Prevention Systems within a DCS
- Session 12: Measuring and Comparing Security in Different Control System Applications