🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Ics Security

13
Total Entries
16
Contributors

Top Contributors

Arun Mane(2) Aditya K Sood(1) Amol Sarwate(1) Dhruv Gupta(1) Divya Nain(1)

All Entries (13 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2024-08-08Tool demoBlackhat ICSGoat: A Damn Vulnerable ICS Infrastructure Source Code Shantanu Kale, Divya Nainics-securityscadaplc+3
2023-09-23TalkNullcon Journey in setting up OT SOC Presentation Ramandeep Singh Waliasocics-securityindustrial-control-systems-security+3
2023-08-07TalkC0c0n Exploring Threats in Operational Technology Manjunath Hiregangeics-securityindustrial-control-systems-securityoperational-technology+2
2022-09-24TalkC0c0n CANalyse: A Vehicle Network Analysis and Attack Tool Kartheek Ladenetwork-pentestingnetwork-traffic-analysiscan-bus+1
2022-09-23TalkC0c0n Cybersecurity for Manufacturing Santhosh Srinivasanindustrial-control-systems-securityics-securitycontrol-systems+4
2021-11-13TalkC0c0n Securing OT in O&G Industry George Eapenics-securityindustrial-control-systems-securitycontrol-systems+2
2021-11-12TalkC0c0n ICS Security —- A need, a challenge and a new change in Mindset Dhruv Guptaics-securityindustrial-control-systems-securitycritical-infrastructure+2
2021-08-08TalkDefcon Top 20 Secure PLC Coding Practices Video Vivek Ponnadaindustrial-control-systems-securitysecure-codingvulnerability-management+3
2019-08-08TalkDefcon Hacking ICS devices for Fun Penetration Testing of Vehicle Components Video Arun Maneautomotive-cybersecuritycan-busics-security+3
2017-07-27TalkDefcon ICS Humla Presentation Video Sneha Rajguru, Arun Maneics-securityindustrial-control-systems-securitypentesting+2
2017-03-03TalkNullcon Securing Critical National Infrastructure Video Shailendra Fuloria, R Sarangapani, Rahul Tongiacritical-infrastructureindustrial-control-systems-securityics-security+4
2015-11-05TalkGround Zero Summit Sanctioned to Hack: Your SCADA HMIs Belong to Us! Aditya K Soodics-securityweb-securityvulnerability-management+3
2012-03-15TalkHackinparis SCADA Security: Why Is It So Hard ? Video Amol Sarwateics-securityindustrial-control-systems-securityscada+3