BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.securitybsides.org.uk//bsides-london-2024//talk//KGL
 YRE
BEGIN:VTIMEZONE
TZID:GMT
BEGIN:STANDARD
DTSTART:20001029T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:GMT
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T020000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:BST
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-bsides-london-2024-KGLYRE@cfp.securitybsides.org.uk
DTSTART;TZID=GMT:20241214T115000
DTEND;TZID=GMT:20241214T123500
DESCRIPTION:There are thirteen pillars upholding the critical national infr
 astructure (CNI) that allows for the every day running of our society. The
 se pillars are sectors that rely on four generations of operational techno
 logy (OT) systems with the oldest generation being pre-Internet. What are 
 these industrial control systems (ICS) that we rely on\, and how are they 
 vulnerable? This talk will outline a generic ICS from the hardware to the 
 protocols that allow the complex systems to speak with one another. Resear
 ch into these systems is often done on physical testbeds and digital twins
  (I don't know about you\, but I wouldn't want to try hack an actual nucle
 ar reactor). The talk will discuss the testbeds that I'm lucky enough to p
 lay with day-to-day. How are these industrial control systems vulnerable\,
  and what can we do to protect these systems from malicious actors? Finall
 y\, how are these thirteen pillars connected? If we knock one down\, will 
 the others fall like dominos?
DTSTAMP:20260315T113504Z
LOCATION:Track 3
SUMMARY:Explaining ICS to a fool of a Took - halfling
URL:https://cfp.securitybsides.org.uk/bsides-london-2024/talk/KGLYRE/
END:VEVENT
END:VCALENDAR
