🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Industrial Control Systems Security

31
Total Entries
31
Contributors

Top Contributors

Harshit Agrawal(4) Arun Mane(2) Santhosh Srinivasan(2) Vivek Ponnada(2) Ajit Hatti(1)

All Entries (31 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-03-02TalkNullcon Satellite Communications: Analyzing and Protecting Space-Based Assets Drishti Jainnetwork-pentestingvulnerability-managementindustrial-control-systems-security
2024-11-26TalkBlackhat Critical Exposures: Lessons from a Decade of Vulnerability Research Nikhil Shrivastavavulnerability-managementsql-injectionpentesting+2
2024-11-21TalkDeepsec Hacking with Physics v2.0 Hrishikesh Somchatwarindustrial-control-systems-securityembedded-securityfirmware-analysis+3
2024-11-15TalkC0c0n Hackers highway: Uncovering vulnerabilities hidden behind every car’s license plate Kartik Lalanautomotive-cybersecurityvulnerability-managementreverse-engineering+2
2024-08-08Tool demoBlackhat ICSGoat: A Damn Vulnerable ICS Infrastructure Source Code Shantanu Kale, Divya Nainics-securityscadaplc+3
2024-04-19TalkBlackhat China’s Military Cyber Operations: Has the Strategic Support Force Come of Age? Presentation Pukhraj Singhindustrial-control-systems-securityrisk-managementsecurity-architecture
2024-04-19TalkBlackhat Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems Presentation Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyayembedded-securityfirmware-analysisvulnerability-management+2
2023-09-23TalkNullcon Journey in setting up OT SOC Presentation Ramandeep Singh Waliasocics-securityindustrial-control-systems-security+3
2023-08-10TalkDefcon Attacking Vehicle Fleet Management Systems Presentation Video Yashin Mehaboobeautomotive-cybersecurityvulnerability-managementindustrial-control-systems-security
2023-08-10TalkDefcon Hardware Backdooring an e-Scooter Arun Manereverse-engineeringindustrial-control-systems-securityvulnerability-management+2
2023-08-07TalkC0c0n Exploring Threats in Operational Technology Manjunath Hiregangeics-securityindustrial-control-systems-securityoperational-technology+2
2023-08-07TalkC0c0n Trust Resiliency - A Lesson Learned from Russia Ukraine War Video Ajit Hattiincident-responsesecurity-architecturerisk-management+2
2022-09-28TalkRootcon Gazing into the Crystal Ball - The Fog of Cyberwarfare Escalations Harshit Agrawalindustrial-control-systems-securitysecurity-architecturerisk-management+1
2022-09-23TalkC0c0n Cybersecurity for Manufacturing Santhosh Srinivasanindustrial-control-systems-securityics-securitycontrol-systems+4
2022-08-14TalkDefcon Tales from the trenches - why organizations struggle to get even the basics of OT asset visibility & detection right Vivek Ponnadaindustrial-control-systems-securityvulnerability-managementrisk-management+2
2021-11-13TalkC0c0n A look into cyber-espionage activities targeting critical infrastructure in India Saurabh Sharmaindustrial-control-systems-securitycritical-infrastructurethreat-hunting+1
2021-11-13TalkC0c0n Cyber Warfare & Securing Critical Infrastructures Faruk Kazicritical-infrastructureindustrial-control-systems-securityincident-response+1
2021-11-13TalkC0c0n Securing OT in O&G Industry George Eapenics-securityindustrial-control-systems-securitycontrol-systems+2
2021-11-12TalkC0c0n ICS Security —- A need, a challenge and a new change in Mindset Dhruv Guptaics-securityindustrial-control-systems-securitycritical-infrastructure+2
2021-10-13TalkRootcon The Kill Chain: Future of Cyber in Defense Video Harshit Agrawalsecurity-architectureindustrial-control-systems-securityrisk-management
2021-08-26TalkHitb Sec Conf Gazing Ahead: What Modern RF Combat Looks Like in the Next Decade Presentation Video Harshit Agrawalindustrial-control-systems-securitysecurity-architecturevulnerability-management+1
2021-08-08TalkDefcon Top 20 Secure PLC Coding Practices Video Vivek Ponnadaindustrial-control-systems-securitysecure-codingvulnerability-management+3
2021-08-06TalkDefcon Defending IoT in the Future of High-Tech Warfare Video Harshit Agrawalvulnerability-managementiot-pentestingsecurity-architecture+1
2019-09-27TalkC0c0n Industry 4.0 - Security and Compliance Santhosh Srinivasanindustrial-control-systems-securitycompliancegovernance+2
2019-09-27TalkC0c0n Looking a decade ahead: Big data, drones , Robots and cyber security. Rahul Sasiindustrial-control-systems-securitysecurity-architecture
2018-10-05TalkC0c0n Cybersecurity Embedded Digital Transformation - The Future Sunil Kanchiembedded-securitysecurity-architectureindustrial-control-systems-security
2018-10-05TalkC0c0n Future of Mobility & Cyber Security Suja Chandyautomotive-cybersecurityindustrial-control-systems-securitysecurity-architecture+2
2017-07-27TalkDefcon ICS Humla Presentation Video Sneha Rajguru, Arun Maneics-securityindustrial-control-systems-securitypentesting+2
2017-03-03TalkNullcon Securing Critical National Infrastructure Video Shailendra Fuloria, R Sarangapani, Rahul Tongiacritical-infrastructureindustrial-control-systems-securityics-security+4
2016-08-04TalkBlackhat Understanding HL7 2.x Standards Pen Testing and Defending HL7 2.x Messages Video Anirudh Duggalvulnerability-managementindustrial-control-systems-securityrisk-management
2012-03-15TalkHackinparis SCADA Security: Why Is It So Hard ? Video Amol Sarwateics-securityindustrial-control-systems-securityscada+3