├── Conferences └── S4x20 │ ├── 01_Barak Perelman - Sponsored Indegy - ICSaaS.pdf │ ├── 01_Controlled-Chaos-DevOps-Security-Shortridge-S4x20.pdf │ ├── 01_Tobias Scharnowski_Special Access Features on PLCs.pdf │ ├── 02_Adam Crain_Applying the Rust Programming.pdf │ ├── 02_Joel Langill_Understanding and Mitigating Risk of Internet-connected Industrial Systems IIoT-ICS.pdf │ ├── 02_Mark Carrigan_Exploitable Vulnerabilities Hidden Deep in OT.pdf │ ├── 02_Yiannis Stavrou_Encryption in IT-OT-IoT Networks and How to Monitor Them.pdf │ ├── 03_Allan Friedman_SBOM.pdf │ ├── 03_Andrew Ginter_Safe OT Security Monitoring.pdf │ ├── 03_Chris Sistrunk_Tuning ICS Security Alerts.pdf │ ├── 03_Jake Brodsky_PLC Secure Coding Practices.pdf │ ├── 03_MATT COWELL_Building an OT SOC_PRINT.pdf │ ├── 03_Matthew Backes_Critical_Infrastructure_as_Code_Final.pdf │ ├── 04_Anton Shipulin_Vladimir Dashchenko_ICS Community building.pdf │ ├── 04_Austin Scott_MAPPING INCIDENTS TO ICS ATT&CK.pdf │ ├── 04_Bryan L Singer_Critical Attack Flow Modeling.pdf │ ├── 04_Bryan Owen_Security Questionnaires For Vendors – Your Top 10 Questions.pdf │ ├── 04_Clint Bodungen_RYUK OT Incidents.pdf │ ├── 04_Eric Byres_Five Blind People and an Elephant called ICS Supply Chain Security.pdf │ ├── 04_Patrick Miller_What If Everything Got Hacked.pdf │ ├── 05_Phoenix_Contact_Next_Generation_Device_Security_v04.pdf │ ├── 05_Ron Brash_PKI-AN AVIATION CASE STUDY.pdf │ ├── 06_Brian Proctor_Sandeep Lota_NIST CSF Maturity.pdf │ ├── 08_Mark Carrigan_Mind the Gap.pdf │ ├── 08_Sarah Freeman_ICS 0Day Market Analysis An Emerging Market.pdf │ ├── 08_Stephen J Hilt_Factory Honeypot A High Interaction Honeypot.pdf │ ├── 08_wp-caught-in-the-act-running-a-realistic-factory-honeypot-to-capture-real-threats.pdf │ ├── 09_Andre Ristaino_ISA Cybersecurity Initiatives.pdf │ ├── 09_Klaus Mochalsk_ICS Security - European Perspective.pdf │ ├── 11_Russell Thomas_Norsk Hydro.pdf │ ├── Photos_03_Jake Brodsky_PLC Secure Coding Practices.pdf │ ├── README.md │ └── S4x20-Agenda-At-A-Glance-Jan2.pdf ├── Events └── README.md └── README.md /Conferences/S4x20/01_Barak Perelman - Sponsored Indegy - ICSaaS.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/01_Barak Perelman - Sponsored Indegy - ICSaaS.pdf -------------------------------------------------------------------------------- /Conferences/S4x20/01_Controlled-Chaos-DevOps-Security-Shortridge-S4x20.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/01_Controlled-Chaos-DevOps-Security-Shortridge-S4x20.pdf -------------------------------------------------------------------------------- /Conferences/S4x20/01_Tobias Scharnowski_Special Access Features on PLCs.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/01_Tobias Scharnowski_Special Access Features on PLCs.pdf -------------------------------------------------------------------------------- /Conferences/S4x20/02_Adam Crain_Applying the Rust Programming.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/02_Adam Crain_Applying the Rust Programming.pdf -------------------------------------------------------------------------------- /Conferences/S4x20/02_Joel Langill_Understanding and Mitigating Risk of Internet-connected Industrial Systems IIoT-ICS.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/02_Joel Langill_Understanding and Mitigating Risk of Internet-connected Industrial Systems IIoT-ICS.pdf -------------------------------------------------------------------------------- /Conferences/S4x20/02_Mark Carrigan_Exploitable Vulnerabilities Hidden Deep in OT.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/02_Mark Carrigan_Exploitable Vulnerabilities Hidden Deep in OT.pdf -------------------------------------------------------------------------------- /Conferences/S4x20/02_Yiannis Stavrou_Encryption in IT-OT-IoT Networks and How to Monitor Them.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/02_Yiannis Stavrou_Encryption in IT-OT-IoT Networks and How to Monitor Them.pdf -------------------------------------------------------------------------------- /Conferences/S4x20/03_Allan Friedman_SBOM.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/03_Allan Friedman_SBOM.pdf -------------------------------------------------------------------------------- /Conferences/S4x20/03_Andrew Ginter_Safe OT Security Monitoring.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/03_Andrew Ginter_Safe OT Security Monitoring.pdf -------------------------------------------------------------------------------- /Conferences/S4x20/03_Chris Sistrunk_Tuning ICS Security Alerts.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/03_Chris Sistrunk_Tuning ICS Security Alerts.pdf -------------------------------------------------------------------------------- /Conferences/S4x20/03_Jake Brodsky_PLC Secure Coding Practices.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/03_Jake Brodsky_PLC Secure Coding Practices.pdf -------------------------------------------------------------------------------- /Conferences/S4x20/03_MATT COWELL_Building an OT SOC_PRINT.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/03_MATT COWELL_Building an OT SOC_PRINT.pdf -------------------------------------------------------------------------------- /Conferences/S4x20/03_Matthew Backes_Critical_Infrastructure_as_Code_Final.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/03_Matthew Backes_Critical_Infrastructure_as_Code_Final.pdf -------------------------------------------------------------------------------- /Conferences/S4x20/04_Anton Shipulin_Vladimir Dashchenko_ICS Community building.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/04_Anton Shipulin_Vladimir Dashchenko_ICS Community building.pdf -------------------------------------------------------------------------------- /Conferences/S4x20/04_Austin Scott_MAPPING INCIDENTS TO ICS ATT&CK.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/04_Austin Scott_MAPPING INCIDENTS TO ICS ATT&CK.pdf -------------------------------------------------------------------------------- /Conferences/S4x20/04_Bryan L Singer_Critical Attack Flow Modeling.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/04_Bryan L Singer_Critical Attack Flow Modeling.pdf -------------------------------------------------------------------------------- /Conferences/S4x20/04_Bryan Owen_Security Questionnaires For Vendors – Your Top 10 Questions.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/04_Bryan Owen_Security Questionnaires For Vendors – Your Top 10 Questions.pdf -------------------------------------------------------------------------------- /Conferences/S4x20/04_Clint Bodungen_RYUK OT Incidents.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/04_Clint Bodungen_RYUK OT Incidents.pdf -------------------------------------------------------------------------------- /Conferences/S4x20/04_Eric Byres_Five Blind People and an Elephant called ICS Supply Chain Security.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/04_Eric Byres_Five Blind People and an Elephant called ICS Supply Chain Security.pdf -------------------------------------------------------------------------------- /Conferences/S4x20/04_Patrick Miller_What If Everything Got Hacked.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/04_Patrick Miller_What If Everything Got Hacked.pdf -------------------------------------------------------------------------------- /Conferences/S4x20/05_Phoenix_Contact_Next_Generation_Device_Security_v04.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/05_Phoenix_Contact_Next_Generation_Device_Security_v04.pdf -------------------------------------------------------------------------------- /Conferences/S4x20/05_Ron Brash_PKI-AN AVIATION CASE STUDY.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/05_Ron Brash_PKI-AN AVIATION CASE STUDY.pdf -------------------------------------------------------------------------------- /Conferences/S4x20/06_Brian Proctor_Sandeep Lota_NIST CSF Maturity.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/06_Brian Proctor_Sandeep Lota_NIST CSF Maturity.pdf -------------------------------------------------------------------------------- /Conferences/S4x20/08_Mark Carrigan_Mind the Gap.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/08_Mark Carrigan_Mind the Gap.pdf -------------------------------------------------------------------------------- /Conferences/S4x20/08_Sarah Freeman_ICS 0Day Market Analysis An Emerging Market.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/08_Sarah Freeman_ICS 0Day Market Analysis An Emerging Market.pdf -------------------------------------------------------------------------------- /Conferences/S4x20/08_Stephen J Hilt_Factory Honeypot A High Interaction Honeypot.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/08_Stephen J Hilt_Factory Honeypot A High Interaction Honeypot.pdf -------------------------------------------------------------------------------- /Conferences/S4x20/08_wp-caught-in-the-act-running-a-realistic-factory-honeypot-to-capture-real-threats.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/08_wp-caught-in-the-act-running-a-realistic-factory-honeypot-to-capture-real-threats.pdf -------------------------------------------------------------------------------- /Conferences/S4x20/09_Andre Ristaino_ISA Cybersecurity Initiatives.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/09_Andre Ristaino_ISA Cybersecurity Initiatives.pdf -------------------------------------------------------------------------------- /Conferences/S4x20/09_Klaus Mochalsk_ICS Security - European Perspective.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/09_Klaus Mochalsk_ICS Security - European Perspective.pdf -------------------------------------------------------------------------------- /Conferences/S4x20/11_Russell Thomas_Norsk Hydro.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/11_Russell Thomas_Norsk Hydro.pdf -------------------------------------------------------------------------------- /Conferences/S4x20/Photos_03_Jake Brodsky_PLC Secure Coding Practices.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/Photos_03_Jake Brodsky_PLC Secure Coding Practices.pdf -------------------------------------------------------------------------------- /Conferences/S4x20/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/README.md -------------------------------------------------------------------------------- /Conferences/S4x20/S4x20-Agenda-At-A-Glance-Jan2.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/Conferences/S4x20/S4x20-Agenda-At-A-Glance-Jan2.pdf -------------------------------------------------------------------------------- /Events/README.md: -------------------------------------------------------------------------------- 1 | 2 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/anton-shipulin/Beer-ISAC/HEAD/README.md --------------------------------------------------------------------------------