talk-data.com talk-data.com

Filter by Source

Select conferences and events

Showing 10 results

Activities & events

Title & Speakers Event

Real-life examples of security incidents that have affected the Transportation sector, hacking techniques used in Penetration Testing ICS and IoT, new wireless attack vectors, and tips for keeping availability and uptime as close to 100% as possible

Key Take-Aways for Attendees 1. Understand how vulnerabilities and security gaps within the Transportation Sector has allowed cyber incidents to disrupt service by dissecting several real-world cases 2. Discover mistakes and security findings disclosed from assessments and penetration tests performed on ICS/SCADA systems in the Transportation Sector to avoid making those same mistakes on mission critical networks and systems 3. Learn about new wireless attack vectors and inexpensive hardware available on Amazon that can be used to target wireless systems used in the Rail Industry 4. Participate in discussions at the end of the session on how best to secure critical ICS and IoT systems used in the Rail Sector to avoid impacts to availability of service

Speaker: Jonathan Pollet Jonathan Pollet, Founder and CEO of Red Tiger Security has over 20 years of experience in Industrial Process Control Systems and Cyber Security. After graduating from the University of New Orleans in Electrical Engineering, he was hired by Chevron and designed and implemented PLC and SCADA systems for onshore and offshore processing facilities in the 1990s. In 2001 he began to publish several white papers that exposed the need for security for Industrial Control Systems (ICS). He is one of the initial charter members of the ISA99/IEC62443 standard, assisted in the drafting of several NERC CIP standards and advisories, and was also on the drafting team for the GIAC GICSP certification. He is still active in the research of vulnerabilities within real-time ICS systems today. Pollet and his team have conducted over 400 security assessments of live Industrial Control Systems around the world and has trained over 3500 professionals with their ICS/SCADA Security Training Courses.

(CS)²AI Online: Vulnerabilities & Hacking Techniques in Transportation ICS & IoT

Real-life examples of security incidents that have affected the Transportation sector, hacking techniques used in Penetration Testing ICS and IoT, new wireless attack vectors, and tips for keeping availability and uptime as close to 100% as possible

Key Take-Aways for Attendees 1. Understand how vulnerabilities and security gaps within the Transportation Sector has allowed cyber incidents to disrupt service by dissecting several real-world cases 2. Discover mistakes and security findings disclosed from assessments and penetration tests performed on ICS/SCADA systems in the Transportation Sector to avoid making those same mistakes on mission critical networks and systems 3. Learn about new wireless attack vectors and inexpensive hardware available on Amazon that can be used to target wireless systems used in the Rail Industry 4. Participate in discussions at the end of the session on how best to secure critical ICS and IoT systems used in the Rail Sector to avoid impacts to availability of service

Speaker: Jonathan Pollet Jonathan Pollet, Founder and CEO of Red Tiger Security has over 20 years of experience in Industrial Process Control Systems and Cyber Security. After graduating from the University of New Orleans in Electrical Engineering, he was hired by Chevron and designed and implemented PLC and SCADA systems for onshore and offshore processing facilities in the 1990s. In 2001 he began to publish several white papers that exposed the need for security for Industrial Control Systems (ICS). He is one of the initial charter members of the ISA99/IEC62443 standard, assisted in the drafting of several NERC CIP standards and advisories, and was also on the drafting team for the GIAC GICSP certification. He is still active in the research of vulnerabilities within real-time ICS systems today. Pollet and his team have conducted over 400 security assessments of live Industrial Control Systems around the world and has trained over 3500 professionals with their ICS/SCADA Security Training Courses.

(CS)²AI Online: Vulnerabilities & Hacking Techniques in Transportation ICS & IoT

Real-life examples of security incidents that have affected the Transportation sector, hacking techniques used in Penetration Testing ICS and IoT, new wireless attack vectors, and tips for keeping availability and uptime as close to 100% as possible

Key Take-Aways for Attendees 1. Understand how vulnerabilities and security gaps within the Transportation Sector has allowed cyber incidents to disrupt service by dissecting several real-world cases 2. Discover mistakes and security findings disclosed from assessments and penetration tests performed on ICS/SCADA systems in the Transportation Sector to avoid making those same mistakes on mission critical networks and systems 3. Learn about new wireless attack vectors and inexpensive hardware available on Amazon that can be used to target wireless systems used in the Rail Industry 4. Participate in discussions at the end of the session on how best to secure critical ICS and IoT systems used in the Rail Sector to avoid impacts to availability of service

Speaker: Jonathan Pollet Jonathan Pollet, Founder and CEO of Red Tiger Security has over 20 years of experience in Industrial Process Control Systems and Cyber Security. After graduating from the University of New Orleans in Electrical Engineering, he was hired by Chevron and designed and implemented PLC and SCADA systems for onshore and offshore processing facilities in the 1990s. In 2001 he began to publish several white papers that exposed the need for security for Industrial Control Systems (ICS). He is one of the initial charter members of the ISA99/IEC62443 standard, assisted in the drafting of several NERC CIP standards and advisories, and was also on the drafting team for the GIAC GICSP certification. He is still active in the research of vulnerabilities within real-time ICS systems today. Pollet and his team have conducted over 400 security assessments of live Industrial Control Systems around the world and has trained over 3500 professionals with their ICS/SCADA Security Training Courses.

(CS)²AI Online: Vulnerabilities & Hacking Techniques in Transportation ICS & IoT

Real-life examples of security incidents that have affected the Transportation sector, hacking techniques used in Penetration Testing ICS and IoT, new wireless attack vectors, and tips for keeping availability and uptime as close to 100% as possible

Key Take-Aways for Attendees 1. Understand how vulnerabilities and security gaps within the Transportation Sector has allowed cyber incidents to disrupt service by dissecting several real-world cases 2. Discover mistakes and security findings disclosed from assessments and penetration tests performed on ICS/SCADA systems in the Transportation Sector to avoid making those same mistakes on mission critical networks and systems 3. Learn about new wireless attack vectors and inexpensive hardware available on Amazon that can be used to target wireless systems used in the Rail Industry 4. Participate in discussions at the end of the session on how best to secure critical ICS and IoT systems used in the Rail Sector to avoid impacts to availability of service

Speaker: Jonathan Pollet Jonathan Pollet, Founder and CEO of Red Tiger Security has over 20 years of experience in Industrial Process Control Systems and Cyber Security. After graduating from the University of New Orleans in Electrical Engineering, he was hired by Chevron and designed and implemented PLC and SCADA systems for onshore and offshore processing facilities in the 1990s. In 2001 he began to publish several white papers that exposed the need for security for Industrial Control Systems (ICS). He is one of the initial charter members of the ISA99/IEC62443 standard, assisted in the drafting of several NERC CIP standards and advisories, and was also on the drafting team for the GIAC GICSP certification. He is still active in the research of vulnerabilities within real-time ICS systems today. Pollet and his team have conducted over 400 security assessments of live Industrial Control Systems around the world and has trained over 3500 professionals with their ICS/SCADA Security Training Courses.

(CS)²AI Online: Vulnerabilities & Hacking Techniques in Transportation ICS & IoT

Real-life examples of security incidents that have affected the Transportation sector, hacking techniques used in Penetration Testing ICS and IoT, new wireless attack vectors, and tips for keeping availability and uptime as close to 100% as possible

Key Take-Aways for Attendees 1. Understand how vulnerabilities and security gaps within the Transportation Sector has allowed cyber incidents to disrupt service by dissecting several real-world cases 2. Discover mistakes and security findings disclosed from assessments and penetration tests performed on ICS/SCADA systems in the Transportation Sector to avoid making those same mistakes on mission critical networks and systems 3. Learn about new wireless attack vectors and inexpensive hardware available on Amazon that can be used to target wireless systems used in the Rail Industry 4. Participate in discussions at the end of the session on how best to secure critical ICS and IoT systems used in the Rail Sector to avoid impacts to availability of service

Speaker: Jonathan Pollet Jonathan Pollet, Founder and CEO of Red Tiger Security has over 20 years of experience in Industrial Process Control Systems and Cyber Security. After graduating from the University of New Orleans in Electrical Engineering, he was hired by Chevron and designed and implemented PLC and SCADA systems for onshore and offshore processing facilities in the 1990s. In 2001 he began to publish several white papers that exposed the need for security for Industrial Control Systems (ICS). He is one of the initial charter members of the ISA99/IEC62443 standard, assisted in the drafting of several NERC CIP standards and advisories, and was also on the drafting team for the GIAC GICSP certification. He is still active in the research of vulnerabilities within real-time ICS systems today. Pollet and his team have conducted over 400 security assessments of live Industrial Control Systems around the world and has trained over 3500 professionals with their ICS/SCADA Security Training Courses.

(CS)²AI Online: Vulnerabilities & Hacking Techniques in Transportation ICS & IoT

Please note: Registration at this link is required to attend. https://attendee.gotowebinar.com/register/8286957998596730201?source=08092023meetupevent

Real-life examples of security incidents that have affected the Transportation sector, hacking techniques used in Penetration Testing ICS and IoT, new wireless attack vectors, and tips for keeping availability and uptime as close to 100% as possible Key Take-Aways for Attendees 1. Understand how vulnerabilities and security gaps within the Transportation Sector has allowed cyber incidents to disrupt service by dissecting several real-world cases 2. Discover mistakes and security findings disclosed from assessments and penetration tests performed on ICS/SCADA systems in the Transportation Sector to avoid making those same mistakes on mission critical networks and systems 3. Learn about new wireless attack vectors and inexpensive hardware available on Amazon that can be used to target wireless systems used in the Rail Industry 4. Participate in discussions at the end of the session on how best to secure critical ICS and IoT systems used in the Rail Sector to avoid impacts to availability of service Speaker: Jonathan Pollet Jonathan Pollet, Founder and CEO of Red Tiger Security has over 20 years of experience in Industrial Process Control Systems and Cyber Security. After graduating from the University of New Orleans in Electrical Engineering, he was hired by Chevron and designed and implemented PLC and SCADA systems for onshore and offshore processing facilities in the 1990s. In 2001 he began to publish several white papers that exposed the need for security for Industrial Control Systems (ICS). He is one of the initial charter members of the ISA99/IEC62443 standard, assisted in the drafting of several NERC CIP standards and advisories, and was also on the drafting team for the GIAC GICSP certification. He is still active in the research of vulnerabilities within real-time ICS systems today. Pollet and his team have conducted over 400 security assessments of live Industrial Control Systems around the world and has trained over 3500 professionals with their ICS/SCADA Security Training Courses.

Please note: Registration at this link is required to attend. https://attendee.gotowebinar.com/register/8286957998596730201?source=08092023meetupevent ---------------------------------------------------------------------------------------------

## All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal https://www.cs2ai.org/ ## Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event. ## If you're interested in speaking at a future (CS)2AI event\, having your organization become a Strategic Alliance Partner\, or engaging in any of the other ways available\, please contact us on our https://www.cs2ai.org/get-involved ## Please note that (CS)2AI ONLINE events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on the Gotowebinar registration page, all events are open for direct funding support.

(CS)²AI Online: Vulnerabilities & Hacking Techniques in Transportation ICS & IoT

Please note: Registration at this link is required to attend. https://attendee.gotowebinar.com/register/8286957998596730201?source=08092023meetupevent

Real-life examples of security incidents that have affected the Transportation sector, hacking techniques used in Penetration Testing ICS and IoT, new wireless attack vectors, and tips for keeping availability and uptime as close to 100% as possible Key Take-Aways for Attendees 1. Understand how vulnerabilities and security gaps within the Transportation Sector has allowed cyber incidents to disrupt service by dissecting several real-world cases 2. Discover mistakes and security findings disclosed from assessments and penetration tests performed on ICS/SCADA systems in the Transportation Sector to avoid making those same mistakes on mission critical networks and systems 3. Learn about new wireless attack vectors and inexpensive hardware available on Amazon that can be used to target wireless systems used in the Rail Industry 4. Participate in discussions at the end of the session on how best to secure critical ICS and IoT systems used in the Rail Sector to avoid impacts to availability of service Speaker: Jonathan Pollet Jonathan Pollet, Founder and CEO of Red Tiger Security has over 20 years of experience in Industrial Process Control Systems and Cyber Security. After graduating from the University of New Orleans in Electrical Engineering, he was hired by Chevron and designed and implemented PLC and SCADA systems for onshore and offshore processing facilities in the 1990s. In 2001 he began to publish several white papers that exposed the need for security for Industrial Control Systems (ICS). He is one of the initial charter members of the ISA99/IEC62443 standard, assisted in the drafting of several NERC CIP standards and advisories, and was also on the drafting team for the GIAC GICSP certification. He is still active in the research of vulnerabilities within real-time ICS systems today. Pollet and his team have conducted over 400 security assessments of live Industrial Control Systems around the world and has trained over 3500 professionals with their ICS/SCADA Security Training Courses.

Please note: Registration at this link is required to attend. https://attendee.gotowebinar.com/register/8286957998596730201?source=08092023meetupevent ---------------------------------------------------------------------------------------------

## All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal https://www.cs2ai.org/ ## Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event. ## If you're interested in speaking at a future (CS)2AI event\, having your organization become a Strategic Alliance Partner\, or engaging in any of the other ways available\, please contact us on our https://www.cs2ai.org/get-involved ## Please note that (CS)2AI ONLINE events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on the Gotowebinar registration page, all events are open for direct funding support.

(CS)²AI Online: Vulnerabilities & Hacking Techniques in Transportation ICS & IoT

Please note: Registration at this link is required to attend. https://attendee.gotowebinar.com/register/8286957998596730201?source=08092023meetupevent

Real-life examples of security incidents that have affected the Transportation sector, hacking techniques used in Penetration Testing ICS and IoT, new wireless attack vectors, and tips for keeping availability and uptime as close to 100% as possible Key Take-Aways for Attendees 1. Understand how vulnerabilities and security gaps within the Transportation Sector has allowed cyber incidents to disrupt service by dissecting several real-world cases 2. Discover mistakes and security findings disclosed from assessments and penetration tests performed on ICS/SCADA systems in the Transportation Sector to avoid making those same mistakes on mission critical networks and systems 3. Learn about new wireless attack vectors and inexpensive hardware available on Amazon that can be used to target wireless systems used in the Rail Industry 4. Participate in discussions at the end of the session on how best to secure critical ICS and IoT systems used in the Rail Sector to avoid impacts to availability of service Speaker: Jonathan Pollet Jonathan Pollet, Founder and CEO of Red Tiger Security has over 20 years of experience in Industrial Process Control Systems and Cyber Security. After graduating from the University of New Orleans in Electrical Engineering, he was hired by Chevron and designed and implemented PLC and SCADA systems for onshore and offshore processing facilities in the 1990s. In 2001 he began to publish several white papers that exposed the need for security for Industrial Control Systems (ICS). He is one of the initial charter members of the ISA99/IEC62443 standard, assisted in the drafting of several NERC CIP standards and advisories, and was also on the drafting team for the GIAC GICSP certification. He is still active in the research of vulnerabilities within real-time ICS systems today. Pollet and his team have conducted over 400 security assessments of live Industrial Control Systems around the world and has trained over 3500 professionals with their ICS/SCADA Security Training Courses.

Please note: Registration at this link is required to attend. https://attendee.gotowebinar.com/register/8286957998596730201?source=08092023meetupevent ---------------------------------------------------------------------------------------------

## All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal https://www.cs2ai.org/ ## Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event. ## If you're interested in speaking at a future (CS)2AI event\, having your organization become a Strategic Alliance Partner\, or engaging in any of the other ways available\, please contact us on our https://www.cs2ai.org/get-involved ## Please note that (CS)2AI ONLINE events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on the Gotowebinar registration page, all events are open for direct funding support.

(CS)²AI Online: Vulnerabilities & Hacking Techniques in Transportation ICS & IoT

Please note: Registration at this link is required to attend. https://attendee.gotowebinar.com/register/8286957998596730201?source=08092023meetupevent

Real-life examples of security incidents that have affected the Transportation sector, hacking techniques used in Penetration Testing ICS and IoT, new wireless attack vectors, and tips for keeping availability and uptime as close to 100% as possible Key Take-Aways for Attendees 1. Understand how vulnerabilities and security gaps within the Transportation Sector has allowed cyber incidents to disrupt service by dissecting several real-world cases 2. Discover mistakes and security findings disclosed from assessments and penetration tests performed on ICS/SCADA systems in the Transportation Sector to avoid making those same mistakes on mission critical networks and systems 3. Learn about new wireless attack vectors and inexpensive hardware available on Amazon that can be used to target wireless systems used in the Rail Industry 4. Participate in discussions at the end of the session on how best to secure critical ICS and IoT systems used in the Rail Sector to avoid impacts to availability of service Speaker: Jonathan Pollet Jonathan Pollet, Founder and CEO of Red Tiger Security has over 20 years of experience in Industrial Process Control Systems and Cyber Security. After graduating from the University of New Orleans in Electrical Engineering, he was hired by Chevron and designed and implemented PLC and SCADA systems for onshore and offshore processing facilities in the 1990s. In 2001 he began to publish several white papers that exposed the need for security for Industrial Control Systems (ICS). He is one of the initial charter members of the ISA99/IEC62443 standard, assisted in the drafting of several NERC CIP standards and advisories, and was also on the drafting team for the GIAC GICSP certification. He is still active in the research of vulnerabilities within real-time ICS systems today. Pollet and his team have conducted over 400 security assessments of live Industrial Control Systems around the world and has trained over 3500 professionals with their ICS/SCADA Security Training Courses.

Please note: Registration at this link is required to attend. https://attendee.gotowebinar.com/register/8286957998596730201?source=08092023meetupevent ---------------------------------------------------------------------------------------------

## All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal https://www.cs2ai.org/ ## Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event. ## If you're interested in speaking at a future (CS)2AI event\, having your organization become a Strategic Alliance Partner\, or engaging in any of the other ways available\, please contact us on our https://www.cs2ai.org/get-involved ## Please note that (CS)2AI ONLINE events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on the Gotowebinar registration page, all events are open for direct funding support.

(CS)²AI Online: Vulnerabilities & Hacking Techniques in Transportation ICS & IoT

Please note: Registration at this link is required to attend. https://attendee.gotowebinar.com/register/8286957998596730201?source=08092023meetupevent

Real-life examples of security incidents that have affected the Transportation sector, hacking techniques used in Penetration Testing ICS and IoT, new wireless attack vectors, and tips for keeping availability and uptime as close to 100% as possible Key Take-Aways for Attendees 1. Understand how vulnerabilities and security gaps within the Transportation Sector has allowed cyber incidents to disrupt service by dissecting several real-world cases 2. Discover mistakes and security findings disclosed from assessments and penetration tests performed on ICS/SCADA systems in the Transportation Sector to avoid making those same mistakes on mission critical networks and systems 3. Learn about new wireless attack vectors and inexpensive hardware available on Amazon that can be used to target wireless systems used in the Rail Industry 4. Participate in discussions at the end of the session on how best to secure critical ICS and IoT systems used in the Rail Sector to avoid impacts to availability of service Speaker: Jonathan Pollet Jonathan Pollet, Founder and CEO of Red Tiger Security has over 20 years of experience in Industrial Process Control Systems and Cyber Security. After graduating from the University of New Orleans in Electrical Engineering, he was hired by Chevron and designed and implemented PLC and SCADA systems for onshore and offshore processing facilities in the 1990s. In 2001 he began to publish several white papers that exposed the need for security for Industrial Control Systems (ICS). He is one of the initial charter members of the ISA99/IEC62443 standard, assisted in the drafting of several NERC CIP standards and advisories, and was also on the drafting team for the GIAC GICSP certification. He is still active in the research of vulnerabilities within real-time ICS systems today. Pollet and his team have conducted over 400 security assessments of live Industrial Control Systems around the world and has trained over 3500 professionals with their ICS/SCADA Security Training Courses.

Please note: Registration at this link is required to attend. https://attendee.gotowebinar.com/register/8286957998596730201?source=08092023meetupevent ---------------------------------------------------------------------------------------------

## All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal https://www.cs2ai.org/ ## Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event. ## If you're interested in speaking at a future (CS)2AI event\, having your organization become a Strategic Alliance Partner\, or engaging in any of the other ways available\, please contact us on our https://www.cs2ai.org/get-involved ## Please note that (CS)2AI ONLINE events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on the Gotowebinar registration page, all events are open for direct funding support.

(CS)²AI Online: Vulnerabilities & Hacking Techniques in Transportation ICS & IoT
Showing 10 results