{"id":19805,"date":"2017-10-17T03:42:31","date_gmt":"2017-10-17T07:42:31","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=19805"},"modified":"2021-07-28T09:45:44","modified_gmt":"2021-07-28T13:45:44","slug":"industrial-cybersecurity-conference-2017","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/industrial-cybersecurity-conference-2017\/19805\/","title":{"rendered":"Industrial cybersecurity: Safeguarding technological progress"},"content":{"rendered":"<p>Why hold conferences on industrial cybersecurity? Primarily, to give a variety of participants a chance to meet, discuss common issues, and try to find solutions. The key word is \u201cvariety\u201d \u2014 conference attendees include critical infrastructure operators, automation tool manufacturers, and security experts, to name a few. Yet it\u2019s not without reason that our yearly industrial cybersecurity conference targets not only techies, but businesses as well. This helps participants grasp the wider market picture, see how it\u2019s changing, and analyze trends.<\/p>\n<p>Kaspersky Lab\u2019s recent Fifth Industrial Cybersecurity Conference showed that the industrial cybersecurity market has reached maturity. Previously, the main problem was that market players spoke different languages: Industrialists were unaware of the risks and threats posed by the digital world, industrial systems manufacturers tried to manage on their own, and both sides turned a deaf ear to the opinions of information security experts. Not anymore.<\/p>\n<p>These days, conversations do not begin with a warning that cyberthreats can damage an industrial enterprise, but with a focused discussion of risks \u2014 and not only risks to the production process, but risks to the environment and the company\u2019s reputation.<\/p>\n<div class=\"c-gallery-slider js-gallery-slider\"><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/10\/17033140\/IcsConf2017-1.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/10\/17033140\/IcsConf2017-1-698x465.jpg\" alt=\"\" title=\"IcsConf2017-1\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/10\/17033140\/IcsConf2017-2.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/10\/17033140\/IcsConf2017-2-698x465.jpg\" alt=\"\" title=\"IcsConf2017-2\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/10\/17033139\/IcsConf2017-3.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/10\/17033139\/IcsConf2017-3-698x465.jpg\" alt=\"\" title=\"IcsConf2017-3\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/10\/17033139\/IcsConf2017-4.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/10\/17033139\/IcsConf2017-4-698x465.jpg\" alt=\"\" title=\"IcsConf2017-4\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/10\/17033140\/IcsConf2017-5.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/10\/17033140\/IcsConf2017-5-698x465.jpg\" alt=\"\" title=\"IcsConf2017-5\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><dl class=\"gallery-item\">\n\t\t\t\t\t\t\t\t<dt class=\"gallery-icon\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/10\/17033141\/IcsConf2017-6.jpg\" title=\"\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"attachment-thumbnail\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/10\/17033141\/IcsConf2017-6-698x465.jpg\" alt=\"\" title=\"IcsConf2017-6\">\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"wp-caption-text gallery-caption\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t<\/dl><\/div>\n<p>Quite a few speeches were devoted to risk management, which can be said to be a new trend in industrial cybersecurity. In an attempt to hedge against large-scale cyberattacks, companies are turning to insurance firms. Some of those firms were represented at the conference.<\/p>\n<p>Most prominent was Marsh, a large international insurance broker and risk consultant. We mention Marsh in particular because together we have signed a memorandum of cooperation that foresees our experts taking part in an audit of industrial enterprises.<\/p>\n<p>The nature of the conference itself has also changed dramatically. Last year, the event was mostly local, with several speakers from European countries, but mostly guests from Russia and the CIS. This time around, we welcomed numerous guests from all over the world, including representatives of our clients and partners from the United States, Canada, Italy, Japan, Sweden, Denmark, Germany, Britain, Switzerland, the UAE, the Philippines, Singapore, and elsewhere.<\/p>\n<p>What\u2019s more, among this year\u2019s speakers were international experts on industrial cybersecurity: Dale Peterson, chairman of the most advanced ICS security conference S4, founder and CEO of Digital Bond, with 17 years\u2019 experience advising industrial companies on ICS security; Eric Byres, a founder of famous Industrial firewall Tofino Security, who alongside his work at ICS Secure is known for creating the BCIT Critical Infrastructure Security Center, the largest US educational center in the field of industrial security; and Marina Krotofil, a recognized industrial security expert and a familiar face at leading ICS security conferences.<\/p>\n<p>Another key change is that guests were not asking \u201cWhy should we protect industrial infrastructure from cyberthreats?\u201d but rather \u201cHow do we do it most effectively?\u201d Therefore, the stands showing off new developments from Kaspersky Lab\u2019s partners and the company itself aroused special interest. Kaspersky Lab, for example, showed the Kaspersky Industrial Cybersecurity (KICS), with applied machine-learning methods and third-party systems based on our operating system, Kaspersky OS.<\/p>\n<p>Sure, many factors are at play in the change of attitude toward industrial cybersecurity \u2014 from the determined efforts of our experts and colleagues from other companies to the all-around improvement in cyberliteracy and, unfortunately, the rising number of incidents. Not least among the latter is WannaCry, which, although not specifically aimed at ICS, accounted for 13.4% of all computers attacked by encryption ransomware inside industrial infrastructures (according to our KLCERT report presented at the conference, which you can view <a href=\"https:\/\/ics-cert.kaspersky.com\/reports\/2017\/09\/28\/threat-landscape-for-industrial-automation-systems-in-h1-2017\/\" target=\"_blank\" rel=\"noopener\">here<\/a>).<\/p>\n<p>Materials, including key speeches and presentations, are available on the <a href=\"https:\/\/ics.kaspersky.com\/conference\/\" target=\"_blank\" rel=\"noopener nofollow\">conference website<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As our latest ICS conference showed, the industrial cybersecurity market has reached maturity.<\/p>\n","protected":false},"author":2423,"featured_media":19810,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[784,1713],"class_list":{"0":"post-19805","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-conference","10":"tag-ics"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/industrial-cybersecurity-conference-2017\/19805\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/industrial-cybersecurity-conference-2017\/19006\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/industrial-cybersecurity-conference-2017\/8363\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/industrial-cybersecurity-conference-2017\/18563\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/ics\/","name":"ICS"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19805","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2423"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=19805"}],"version-history":[{"count":9,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19805\/revisions"}],"predecessor-version":[{"id":40805,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19805\/revisions\/40805"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/19810"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=19805"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=19805"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=19805"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}