Conference Program

November 3rd, 2016 – Conference Program

7:30 am – Registration Opens

8:30 am – Keynote Address
Unmanned Aerial Systems, IoT and Modernization of the Electric Grid – Implications for SCADA
With an aging infrastructure,  increased complexity of the electric grid and the associated SCADA systems, and a power system distribution infrastructure that is inherently vulnerable to outages considering that thousands of miles of critical current-carrying distribution lines are of radial configuration, it is critical to understand the state of health of the system and components.  Enter low cost sensors and mobile platforms – in other words Unmanned Aerial Systems (UAS) with enhanced sensing capabilities.

This presentation will provide an overview of methods for improved knowledge of equipment condition that will allow asset owners to better manage their fleet; a review of measurement needs in the generation, transmission and distribution components of the modern grid; implications for injecting non-traditional SCADA data into a utility’s information database via SCADA connectivity; and reporting on a Dept of Energy (DOE) sponsored research activity – part of the Grid Modernization Laboratory Consortium (GMLC) program – at a metropolitan utility (EPB, Chattanooga TN) where UASs with advanced sensors are integrated into the utility’s fiber optic communication network providing critical Asset Monitoring capabilities.

Use cases to be presented range from sensors on mobile platforms (way beyond simple cameras on drones) to substation and vault monitoring (corona discharge, cellsignal detection, chemical, acoustic, thermal, ambient environment anomalies) to automated, control-center controlled mobile platform inspection of  transmission/distribution lines and poles, with logical data interfaces into DNP3/61850 and similar SCADA protocols.

The presentation concludes with a look at the “visible future” where UASs are stationed at critical locations throughout the grid, powered via energy harvesting techniques and flown in autonomous manners for way-point defined grid inspection.

Peter Fuhr, Distinguished Scientist and Tech Dir UAS Research Center -
Oak Ridge National Laboratory

9:30 am – Featured Presentation
The SCADA System Solution as Core Component of Digitalization
SCADA systems have undergone rapid development in the Industry in the last fifteen years. Increased networking as part of digitalization has made transparency in production and therefore intelligent data preparation increasingly important. When selecting suitable systems, plant operators look for innovative and reliable solutions to visualize the ever more complex procedures in industrial production and access to information about relevant production data and processes. This presentation examines the role of a SCADA system acting as the Elmers Glue for factory floor data providing central aggregation, data normalization and redistribution of information to up to the Digital Enterprise.

Carl Hoffman, SCADA Business Developer – Siemens Industry, Inc.

10:15 am – Networking Break/Exhibit Hall Opens

11:00 am – Track 1
How a Rural Telco Successfully Monitors Their 3 Fiber Rings – and How They Restored Alarms After a Switch Upgrade
Interbel Telephone has about 3,500 access lines, 3 fiber rings, 1 central office, and about 30  remote sites. On this Q&A session, learn how they remotely monitor and control their infrastructure to be a highly reliable telephone company in a rural area.

Rob Little, Plant Manager at Interbel Telephone, will give an overview of Interbel’s infrastructure. With generators, power status, doors, smoke alarms, fuse alams, and more, there’s a lot to monitor at Interbel. Rob will explain the network-visbility challenges inherent in his work, and he’l explain how he’s solved them. Learn how to minimize windshield time and expensive network outages with the benefit of Rob’s extensive experience.

Andrew Erickson from DPS Telecom will reveal the Top 10 most important monitoring strategies. These real-world tips & tricks were gathered by surveying the DPS client base of telcos, utilities, railway operators, and government agencies. Learn how one phone company is leveraging remote-monitoring technology to maximize efficiency and minimize downtime. Learn what network operators of all kinds recommend that you do to keep your network online, conserve budget, and comply with government regulations.

Rob Little, Plant Manager – Interbel Telephone
Andrew Erickson, Director of Marketing – DPS Telecom

Track 2
Dynamic Flow Setpoint Program
Learn about a Dynamic Flow Set-Point Program that was developed for remote pumping facilities with local storage to stabilize the demand they place on the treatment plant.

At midnight, the program calculates the required influent flow set-point based on the demand from the previous day.In manual operation, the flow set-point is fixed and the program learns the level profile of the reservoir by recording it every hour.In automatic mode, the program re-calculates the influent flow set-point by comparing the reservoir level with the expected level in the reservoir.

  • If the reservoir level deviates from its expected level, the influent flow set-point is dynamically increased or decreased to move the level back towards its expected level.
  • At the end of each hour, the new value of the level profile for that hour of the day is calculated and the entire level profile may be raised or lowered to ensure that, even though the shape of the profile may change, it remains anchored to the minimum operating level.

The program maximizes turnover in the reservoirs, adapts to accommodate seasonal changes, and adjusts flow to compensate for unexpected changes in demand long before the reservoir level approaches either high or low alarm limits.

Alasdair MacLean, Manager of Instrumentation & Controls – EPCOR Water

11:30 am – Track 1
Smart Pipeline Leak Detection System
This presentation discusses recent work focused on the development of a machine learning-based, low power, remote sensing technology that is capable of reliably and autonomously detecting small hazardous pipeline leaks (liquids and gases) in real-time.

The system fuses inputs from various types of passive optical sensors and applies machine learning techniques to reliably detect “fingerprints” of small hazardous leaks.  Optical sensors used include: long-wave infrared, short-wave infrared, hyperspectral, and visual cameras. However, different types and/or combinations of sensors allow the technology to easily adapt to changing applications, environments, and target substances.

While much has been accomplished in developing remote sensing technologies, limited work has been done in developing solutions that meet three key critical criteria for effective anomaly detection and mitigation: (1) autonomy (no need for a human to be in the loop), (2) high reliability (low false alarm rates), and (3) real-time performance (ability to detect anomalies within a few minutes).  It is the emphasis on these three key aspects that significantly advances the state-of-the-art in leak detection using optically-based sensing technologies.  Trial results of this work will be presented.

Samantha Blaisdell, Research Engineer – Southwest Research Institute

Track 2
Manufacturing Implementation of the NIST Cybersecurity Framework
The Cybersecurity Framework (CSF) is a voluntary, risk-based approach for managing cybersecurity activities and reducing cyber risk within an organization. A manufacturing implementation of the CSF, or Profile, was developed to establish a roadmap for reducing cybersecurity risk that is aligned with manufacturing sector goals and industry best practices. The Manufacturing Profile is being implemented in the NIST Cybersecurity for Smart Manufacturing Testbed using various cybersecurity solutions to meet the Profile and any network or operational performance impacts are being measured. The NIST Cybersecurity for Smart Manufacturing Testbed includes process control and robotic assembly systems. From this research, guidance will be developed on implementing the CSF in manufacturing environments without having negative performance impacts on the systems.

Keith Stouffer, Cybersecurity for Smart Manufacturing Systems Project Lead -
National Institute of Standards and Technology (NIST)

12:00 pm – Track 1
FCC Compliance and Frequency Recommendations/Selection for SCADA and MAS systems
Purchasing radio equipment may seem as easy as buying a new laptop, yet there is more involved. Just like purchasing a license for a computer operating system, like Windows, a company has a responsibility to apply and secure an authorization from the Federal Communications Commission (FCC). The license process involves a formal application, frequency recommendation from an FCC recognized Frequency Coordinator and user compliance. Let us discuss the nuances of this requirement and how to avoid potential hefty fines from the FCCs Enforcement Bureau for operating a SCADA out of compliance.

Elizabeth Buckley, FCC-FAA Licensing Expert – FCC-FAA Licensing, LLC
Mona Lee, President – Mona Lee and Associates

Track 2
How Well Chronicled Cyber-attacks Can Damage Nation’s Utilities
Due to the wide range of industrial control implementations, architectures, and impacts, the industrial cyber security market is rightly advocating a risk-based management approach. However, technology and attackers often outpace the assumptions made in the risk assessment, leading to a “protect against the last attack” approach. Good perimeter security and computer endpoint protection are sound security recommendations, but do they really protect against the threats going forward?

An industrial control or automation system is not the same as an enterprise IT system for the simple reason that the risks and the impacts are different. Security solutions must fit within the operational constraints of the system and within the risk appetite of the client organization. Otherwise the fix can cause a greater impact overall than an attack. This presentation also will provide proposals and approaches for addressing the underlying security problems inherent in control systems that should be considered in addition those generally proposed.

In this session you will learn:

  • Introduction and overview: The utilities-security landscape
  • Understanding the challenges: How utility systems are easily breached
  • Appreciating the risk severity: Summarizing actual and potential results of cyber-attack
  • Considerations in developing a cyber security plan
  • Methods for efficiently implementing a utilities plan for cyber security: Understanding tactics, technologies, costs and timelines

Matthew Cowell, Director of Industrial Markets – Ultra Electronics, 3eTI

12:30 pm – Networking Lunch

1:30 pm – Track 1
SCADA and IT Speak the Same Language
There is often resistance between SCADA and IT due to differing priorities and disciplines within the organization. A better focus on company goals and objectives can help unify SCADA and IT personnel to reduce friction and lay the groundwork for better SCADA development and IT protocols that make for improved network and SCADA security. By ensuring that both SCADA developers and IT personnel understand the objectives of each new phase of implementation, its possible to ensure both teams work toward common goals of reliability, flexibility, and security.

Larry Combs, VP of Customer Service and Support – Indusoft

Track 2
Essentials of Cyber Security Intelligence for Protecting ICS
Modernization of ICS includes new applications and systems that utilize interconnected IP networks. These IP networks carry an increasing amount of data and control information for intelligent end points involved in operating critical infrastructures. With this evolution, exposure to cyber threats exists from both internal and external sources.

This session offers insights into successful ICS hacks and identifies common ways in which hackers gain access to critical infrastructure networks, data and assets. We will also explore insider cyber risks and ways in which many of these can be avoided or greatly reduced.

An overview of cyber security best practices for ICS will be presented and we will share case studies from several utilities that have utilized timely cyber security intelligence to reduce their risk exposure.

Jeff Bridgland – N-Dimension Solutions Advisory Board Member

2:00 pm – Track 1
Migration Approaches for Legacy SCADA System Capacity and Security Upgrades
Recent transformations in narrowband technology is breathing new life into the licensed sub-1 GHz space. Greenfield deployments are simple, but how do you leverage this technology advancement for existing deployments?

A method of SCADA radio migration has been developed to avoid the pain and disruption of wholesale legacy SCADA radio replacement. The approach retains existing master station infrastructure (such as antennas) and utilizes existing licensed channels to enable a smooth and progressive narrowband network transformation. A key advantage is that remotes can be replaced unit by unit as budgets allow, with the old and new systems running in parallel during transition without the need for additional spectrum. This allows the SCADA team to prioritize sites that require additional capacity or IP connectivity while the operation of remaining legacy sites is maintained.

Steve Moffat, COO – 4RF Limited 

Track 2
The Anatomy of an Industrial Cyber Attack
We will skip the standard pitch about why ICS networks are vulnerable and the criticality of operational continuity, and go right to the point, which is to explain how ICS cyber attacks really operate and where are the security gaps that enable these attacks. Industrial networks are inherently different than IT networks. In most IT cyber attack scenarios, the same protocols are used for configuration and production operations. However, in industrial networks, different protocols are used for different types of operations. The builders of Stuxnet understood this more than 5 years ago, yet most security specialists still dont fully understand the difference.

In this session we will discuss:

  • The need to monitor the proprietary network protocols and track all changes to the controllers
  • Why changes to PLC code blocks are transparent to standard OT protocol inspections (i.e. MODBUS/DNP3/ICCP) and what should be monitored
  • Which additional security gaps must be addressed in order to protect ICS networks against cyber-attacks, malicious insiders and human errors

Join us for this myth-busting session in which we will dispel common fables around industrial cyber attacks and explain how they really operate.

Dana Tamir, VP Marketing – Indegy

2:30 pm – Track 1
Designing an Industrial Wireless Network: Steps to Ensure Reliability
While there are many wireless solutions available for the industrial market, wireless is not a “one size fits all.” It is important to make sure that all components of a wireless network are chosen correctly to ensure reliable operation. This presentation will offer basic guidelines on how to find the most reliable wireless solution for industrial wireless applications.

Whether you are adding wireless to an existing installation or designing an entirely new application, focusing on efficient design and installation practices is critical, especially for the industrial world.

A properly designed wireless solution can fit into nearly any process installation. Before deciding on a specific wireless technology or components, however, an installer needs to examine three main factors: interference, distance, and speed. This presentation will cover these three main factors and provide some applications that represent how each of these factors are important to take into consideration during the design of an existing or new wireless system.

Zechariah Hoffman, Wireless Product Specialist for I/O and Networks -
Phoenix Contact USA

Track 2
ROI on Cyber Security Monitoring Technologies
Measuring true return on investment (ROI) for cyber security monitoring continues to elude many executives. In many cases, it may not make financial sense for some small to medium sized businesses to invest in the hardware, software, training, and personnel required to provide cyber security intrusion detection monitoring.

Outsourcing some of the security monitoring and management allows an external firm to pick up the heavy lifting associated with this type of work, which in turn allows your existing team to focus on the core business that you need them to do.

This session will explore why it makes sense to have an outsourced managed security firm watching over your corporate network especially in cases where you have multiple locations and you want them all to be protected to the same level.

John Christly,Chief Information Security Officer -Netsurion

3:00 pm – Networking Break in Exhibit Hall

3:45 pm – Track 1
Hybrid SCADA Communication Networks Using SD Radios
Energy companies with large geographically dispersed networks usually don’t select just one technology, or one manufacturing source and seldom one vendor to collect, diagnose and report today’s SCADA data information. Linux based radio platforms have the ability to assess the health of the communications network, extracting MIB’s from the radio information and using SolarWinds, OpenNMS, OPC Systems or other types of diagnostic software is now normal. In times past they may have used a single communication type or manufacturer, today the Hybrid type of approach makes more sense.

Today integrating various types of technologies can offer significant benefits that can be easily and cost-effectively incorporated into one cohesive network. You have the ability today to be able to choose several types of RF spectrum, speeds, RS232 and RS485 serial, I/O and Ethernet devices at various speeds and multiple types of inputs all in one communications network.

During this presentation, all of the factors necessary for considering a hybrid communications networks using SD radios will be discussed. There will be a review of several different types of telemetry technologies, including the benefits and challenges of leveraging them in a hybrid network setting. Furthermore, the presenter will review several key considerations for reviewing a system prior to any installation.

Dan Steele – XetaWave

Track 2
Secure Remote Monitoring and Control Using E2C Edge and SELinux
Learn how Security Enhanced Linux (SELinux) on the cRIO/sbRIO platform works and where it fits in an embedded system security architecture. Tresys Technology, the maintainers of the SELinux open source tools, will describe how SELinux works, what it can control, and how it can prevent an attacker from using a single bug in an application to own an entire device. National Instruments Gold Alliance Partner, Prolucid Technologies, will give an overview of where SELinux fits into each layer of security in their architecture that helped its LabVIEW-based products meet their customers’ stringent security requirements.

Art Wilson,Vice President of Technology – Tresys Technology
Graham Beauregard, software technology expert – Prolucid Technologies

4:15 – Track 1
In order to reduce costs and increase reliability, companies that rely on SCADA for their daily operations are continually seeking alternative solutions for transport of their data.By conducting field and lab trials, one large UK based utility company determined that carrying SCADA traffic over its own licensed, tier III DMR radio network was an optimal solution for full deployment across its vast electrical grid.

A VHF DMR Tier III radio network was built to support the 8,000 data points that needed monitoring. It forms a fully integrated IP Network to connect information sent from data modems and Remote Terminal Units (RTU) back to the monitoring devices also on the IP network. This makes the solution easy to scale since more modems, RTU or monitoring devices can be added as needed. Additionally it provides the Operations & Maintenance teams a constant insight into the health of the electric grid, all over reliable, privately licensed radio channels, and the ability to carry voice communications over the network.

If a problem is detected on the Electric Grid, time and money is saved by knowing exactly where the fault has occurred. The ultimate goal of having all service interruptions restored within 60 minutes of notification has become more of the norm than the exception by relying on the DMR Tier III IP Network for transport of the SCADA information.

Gary Correia,Vice President Sales & Business Development, Americas - Simoco

Track 2
Hacking Critical Infrastructure Becomes Easier Everyday
Operation Technologies (OT) and Information Technologies (IT) are converging. This convergence has caused an important change in the modern threat landscape due to the connectivity of industrial control systems (ICS) to the digital environment. While engineers and operators of ICSs are very familiar with OT there has been little overlap with those in the IT area and typically OT and IT are managed by different parts of the business in isolation. SCADA systems now connect through 3G/4G and GSM-R has replaced the previously used analogue radio systems used in the transport network but how secure are these systems? Is an isolated SCADA system really isolated or can you hack it by gaining access through its ICS vendor? Can you hack a digital substation using the telecom network or, indeed, hijack a high speed train?

The defense is a better security strategy.In the presentation will be given informations about major threats and defense strategies observed in 10 years research. This is not what we class as a product pitch but rather an opportunity to share our research in this environment.

Paolo Emiliani,ICS Security Manager (Europe) – Positive Technologies

5:00 pm – Cocktail Reception in Exhibit Hall

November 4th, 2016 – Conference Program

8:30 am - Keynote Session
SCADA In the Cloud
Although cloud computing is becoming more common, its relatively new for SCADA applications. Cloud computing provides convenient, on-demand network access to a shared pool of configurable computing resources including networks, servers, storage, applications, and services. These resources can be rapidly provisioned and released with minimal management effort or service provider interaction.

By moving to a cloud-based environment, SCADA providers and users can significantly reduce costs, achieve greater reliability, and enhance functionality. In addition to eliminating the expenses and problems related to the hardware layer of IT infrastructure, cloud-based SCADA enables users to view data on devices like smartphones and tablet computers, and also through SMS text messages and e-mail.

Larry Combs, VP of Customer Service and Support – Indusoft

9:30 am – Featured Presentation
SCADA Cyber Security in the Age of Internet of Things
SCADA systems, and the broader Industrial Control Systems (ICS) including Human Machine Interface, Building Management Systems, Manufacturing Execution System and Computerized Maintenance Management Systems, have roots in proprietary technology that was traditionally isolated from the enterprise information technology (IT) infrastructure.  These platforms were not originally designed for cyber security.

The current focus on connectivity under the banner of the Internet of Things (IoT), and the closely related Industrial Internet of Things (IIoT) or Industry 4.0, has a huge potential benefit to data aggregation strategy and situational awareness.  However, the very nature of IIoT devices is the use of Internet Protocols (IP), which further increases the exposure to cyber threats.

Learn how the modern ICS platforms incorporate the Software Engineering Institute’s Cyber Risk and Resilience Management into the ISO 9001 Quality Process for development and production.  The goal is to be transparent regarding internally or externally reported vulnerabilities and to act quickly to minimize risk for customers.

Participation in the National Agency for the Security of Information Systems and standards organization such as the IEEE and the IEC assist in reaching the goal of transparency through open discussion and feedback.  Participation is critical to rapid implementation of the recommendations coming from these organizations.

The National Institute of Standards and Technology (NIST) has provided a framework that is invaluable for systematically identifying an organization’s critical assets, identifying threats, and securing critical assets. The framework is identify, protect, detect and react.

Edward Nugent, COO – PcVue, Inc.

10:30 am – Networking Break in the Exhibit Hall

11:00 am – Track 1
Enhancing Electrical Power Distribution Quality Through Satellite Telemetry
The key objectives of electrical distribution system integration are for utilities to ensure greater reliability, availability and timely response to contingencies caused by system faults. Through the quick and efficient dispatch of well-informed and well-prepared maintenance crews, it is possible to reduce SAIDI and SAIFI rates, thereby improving the quality of the supply of electricity. However, this must be done while maintaining costs in line with local market economical demands.

Satellite telemetry is a convenient solution for the monitoring and control of reclosers and other protective devices installed in the electrical grid. In addition to being easily integrated into Smart Grids as a contingency measure against outages and/or lack of local cellular coverage (or other relevant technologies), it can also be relied upon as the primary means of communication. This cost-effective stand-alone solution can be easily deployed in both rural and urban areas, providing clear technical and financial advantages in large utility and energy cooperative markets.

This session will outline how satellite can improve the reliability, availability and maintenance of your electrical distribution system.

Reinaldo Burian, Application Engineer, Smart Grid – ORBCOMM


Track 2
Connected World Security – Cyber and Physical
In today’s connected world, many systems are able to communicate on a wired or wireless network to exchange data. It is essential that these devices be secured against emerging threats that could compromise the confidentiality, integrity, and availability (CIA) of these devices and the data they use.

This presentation will explore methods to secure these devices, regardless if they are connected via wired or wireless connections. We will also explore the concept of utilizing managed security service providers to watch over these devices and to act upon intrusions that could affect the device or its data.

Managed security service providers deploy state of the art hardware and manage the security of many clients across the globe, so they have the advantage of knowing what emerging threats are targeting certain verticals or geographic areas, allowing them to make risk based decisions faster and with more accuracy than most firms can do on their own.

As it pertains to physical security, this presentation will explore the various threats to a business that are non-cyber related, including everything from a disgruntled customer who could do damage to your place of business, to employees that steal from you.

John Christly, Chief Information Security Officer (CISO) – Netsurion

11:30 am – Track 1
Going Beyond Monitoring in Backup Battery Systems
Telecommunications companies rely on backup battery systems to maintain uptime. Many sites have generators, but virtually all have lead-acid batteries. A range of remote monitoring technologies are now available for these batteries, including those that go beyond monitoring by managing batteries, and allow technicians more remote control over the site.

We will discuss successful applications of battery technology in telecom, walking through a variety of examples where a ‘more-than-monitoring’ technology has helped identify and solve issues that otherwise may have been undetected. For many carriers, managing batteries involves replacing them on a preset schedule, whether or not they need replacing. Scheduled testing may or may not complement these replacements. Both involve unnecessary maintenance time, extra cost if healthy batteries are replaced early, and extra risk if unhealthy batteries fail between cycles or tests.

Secondly we will examine the business case for monitoring and management technologies compared to traditional methods of maintenance and manual management. Finally, we will use the information covered to speak to the direction of the industry towards greater remote control capabilities. Monitoring is extraordinarily useful, but technology will also allow improved feedback loops that must constantly be increasing efficiency. The key to these loops is compiling and processing accurate data.

Alex Rawitz, Business Development Manager – Servato

Track 2
Intelligent Monitoring and Control: Essential Guidance for Critical Infrastructure Security
In recent months, security investigators have discovered numerous vulnerabilities specific to one protocol, in particular DNP3, a firewall-averse link found throughout SCADA systems that drive most water, energy and electrical systems and utilities. Some of these vulnerabilities can damage equipment and impede or even halt operations.

Industrial networks facilitate the free flow of messages that can allow poison packets to transmit with potentially disastrous effect. The use of DNP3 Secure Authentication doesnt protect all payloads or those from a compromised device, making validated protocol-aware packet inspection essential.A comprehensive approach should become the standard for fully parsing the DNP3 protocol, including DNP3 Secure Authentication messages, to detect any malformed, unauthorized, or malicious messages.

To illustrate protocol problems and their resolution, case-based scenarios will draw from the US Navy’s Enterprise Industrial Controls System (EICS) deployment.The narrative will be supported by findings from a collaborative DNP3 security review with security experts. Dozens of vulnerabilities were discovered and reported that affected industrial-control software and systems. Participants will better understand through the findings how seemingly security-immune connections, such as those managed by DNP3, can be made safe without slowing or interfering with network operations and fidelity.

Matthew Cowell, Director of Industrial Markets – Ultra Electronics, 3eTI

12:00 pm – Networking Lunch

1:00 pm -
In-Pipe Turbine Generator for Onsite Power
New technology has been developed that allows an in-pipe turbine generator (IPTG) to generate electrical power by recovering energy from gas or other fluids flowing through a pipe. The unit is designed to operate unattended at remote locations that have limited or no access to commercial power. The IPTG has no emissions and does not consume fuel.

Attend this session and learn about how IPTG technology is more reliable than wind or solar, and does not suffer the drawbacks of TEG or other combustion-based technologies. The IPTG replaces a short section of pipe at or near a wellhead. The flow of the fluid through the pipe spins an internal, permanent magnet array. The magnetic flux generated produces current in a coil array external to the pipe. Output is 24 V DC, and is sufficient to power SCADA or small motors, or to charge batteries or serve other general utility uses.

Bruce Kaiser, Founder and CEO – Lightning Master

Track 2
Eliminating Security Blind spots in SCADA and Control Networks
The need for visibility and security in SCADA and ICS networks is growing, as recent attacks such as the Ukrainian electric utility, the New York City dam, and other have demonstrated. Designed years ago, before the cyber threat existed these networks are not only vulnerable to attacks, but also lack visibility and security controls common in corporate IT networks.

Contrary to popular belief, it is not difficult to attack these vulnerable networks. However, they are quite difficult to defend. In this session we will examine what needs to be done in order to gain the visibility necessary to detect and respond to malicious and unauthorized activities in SCADA and ICS environments.

Join us to learn more about

  • External and internal threats to SCADA/ICS networks
  • The hidden security gaps in SCADA/ICS networks
  • The need to monitor the proprietary network protocols and track all changes to the controllers

Barak Perelman, CEO and Co-Founder – Indegy

1:30 pm
Applying Military Tactical Networking Lessons-Learned to Enable Industrial Remote Monitoring
The US DoD, and particularly the US Army, has long deployed networking equipment in remote and harsh environments to enable a wide variety of remote sensor and communications applications. To meet demanding requirements related to transport, uptime, security and ease-of-maintenance and availability of support, the DoD has adopted a new approach of re-engineering enterprise-class COTS networking equipment to meet MIL-STD environmental standards.

This presentation will dive deep into new technical approaches, now progressing through DoD acquisition processes, that address remote equipment size, weight and power (SWaP), usability, security and limited availability of trained staff and support. Through a new approach of re-engineering enterprise class hardware into rugged form factors, and adapting virtualized network functions to rugged platforms, the DoD gains the benefits of enterprise-class functionality in packages ideally suited for remote connectivity and processing.

Products based on this approach are now becoming commercially available for industrial applications of remote monitoring, for use in Oil & Gas exploration and production, Mining, Transportation and more, where operations require transport, mobility, interoperability and reliability in environments that have limited IT resources.

Charlie Kawasaki, CISSP, Chief Technical Officer - PacStar

2:00 pm – Conference Closing Remarks