This year’s agenda will provide broad exposure to Idaho National Laboratory control systems cybersecurity capabilities and ongoing work, including:
· A classified threat briefing and discussions of adversary kill chain methodologies to provide overall context.
· Exposure to ongoing control system supply chain risk and mitigation projects.
· Demonstrations of recently developed tools and methodologies, such as:
o Structured Threat Intelligence Graph (STIG): A method to easily share threat information with owners and operators of critical infrastructure.
o Consequence-driven Cyber-informed Engineering (CCE): an intelligence and engineering focused approach to securing the most critical assets.
o All Hazards Analysis (AHA) Tool: A method to identify cyber security weaknesses across the threat spectrum.
· Tours of malware reverse engineering, chip de-encapsulation and control system exploitation laboratories, along with more specialized areas, such as those focused on engine control vulnerability and analysis.
· In-depth discussions about current and emerging control systems cyber security training, including the DHS “Red/Blue” training program and newly launched programs tailored for specific military service branches.
· Opportunities for deep dives into specific areas of interest and/or discussions about potential collaborations of specific interest to attendees and the organizations they represent.