November 5-7, 2014
Rio de Janeiro, RJ

Schedule

Lectures

Local: Boardroom 1

11/05/2014 (Wednesday)

  • 8:00 to 9:00
    Breakfast and registration
  • 9:00 to 9:40
    Marcelo Branquinho
    Code: PT-CLASS01
    Current overview of the security status in Brazilian industrial networks
    More information

    Marcelo Branquinho

    Current overview of the security status in Brazilian industrial networks

    PT-CLASS01

    The lack of official sources of information about security incidents in industrial and SCADA networks in Brazil generates an important gap in the cycle of protecting our critical infrastructure. Without statistics on incidents, necessary investments in the security of critical infrastructure are not made keeping them vulnerable. A comprehensive study on the current state of security of critical national infrastructure and a suggestion for the creation of a national ICS CERT will be presented.

  • 9:40 to 10:20
    Jason Larsen
    Code: PT-CLASS30
    Miniaturization
    More information

    Jason Larsen

    Miniaturization

    PT-CLASS30

    Too often researchers ignore the hard parts of SCADA hacking. Too many presentations could be described as “I got past the SCADA firewall so I win!!!”. Little information is available on what to do after the attacker gains control of the process. As a challenge consider the scenario where I just gave you control of a paint factory. Now what? The answer to that question is often specific to the process, but there are a number of generic techniques that can be discussed. Often, designing an attack leads to interesting hacking and computer science challenges. Miniaturization is one of those problems. The first part of the presentation deals with a set of algorithms used to make the actual attack code as small as possible. Suppose an attacker wanted to hide in a PLC. Suppose he wanted to hide all the way down in a pressure sensor. Is such a thing possible? The attack must be miniaturized to fit within the constraints of the embedded device and may need to be miniaturized into just a few kilobytes of memory. This is an interesting problem. The second part of the presentation deals with inserting the attack code generated above into the existing firmware. One of the great challenges of writing a firmware modification is testing the code. In order to make the modifications small enough the crafter needs to reuse large chunks of existing code. Trying to stick a second C library into a microcontroller isn’t really a good idea. The process of merging the rootkit code with the existing firmware is time consuming and manual as well as being almost impossible to formally debug.

  • 10:20 to 11:00
    Silvio Prestes and Daniel Guillize
    Code: PT-CLASS09
    Security for critical automation systems using the ATAM method - Architecture Tradeoff Analisys Method
    More information

    Silvio Prestes and Daniel Guillize

    Security for critical automation systems using the ATAM method - Architecture Tradeoff Analisys Method

    PT-CLASS09

    Critical automation systems have been constructed to be safe and with adequate response time for the various requests from both international and national regulatory bodies. Another feature of these systems is that in the past were in isolated environments, but nowadays, are interconnected and exposed to several potential attacks. Within this framework we present a preview of the security checks based on the requirements given versus security aspects presented by the literature and by international bodies such as the ANSI/ISA-99. This presentation will show that the security requirements do not meet international standards, but meet the combined performance requirements. We will make suggestions through a chosen aspect so that the security of an automation system can be improved.

  • 11:00 to 11:20
    Interval
  • 11:20 to 12:00
    Renato Mendes
    Code: PT-CLASS13
    Database Industrial systems protection
    More information

    Renato Mendes

    Database Industrial systems protection

    PT-CLASS13

    Industrial plants have a plethora of operating and management systems such as ERP and MES. Nowadays these systems are major targets of industrial espionage, sabotage and hacking because they store business strategic information such as commercial, financial and human resource data, formulas, recipes and process setpoints, processes sequencing configuration and laboratory quality information, among others. Any vulnerability in these systems may allow subtraction or alteration of these data, jeopardizing the operation, competitiveness and the reputation of the company, besides incurring operational risk arrest, damage to the environment and to human health. In this talk the main vulnerabilities of these systems and effective strategies for protecting these real-time data suitable for use in industries will be presented.

  • 12:00 to 12:40
    Delfin Rodillas
    Code: PT-CLASS04
    Defending Industrial Control Systems Against Cyberthreats with Next Generation Security
    More information

    Delfin Rodillas

    Defending Industrial Control Systems Against Cyberthreats with Next Generation Security

    PT-CLASS04

    Advanced Persistent Threats (APTs) such as Stuxnet make it to the headlines when it comes to cyberthreats in Industrial Control Systems. But beyond yet to be discovered APTs, there are other areas of exposure asset owners need to be aware of when planning ICS security strategies. For example, product specific vulnerabilities continue to be discovered and the industrial control protocols themselves can be used in malicious ways to compromise system availability and safety. Besides malware and exploits, the definition of a cyberthreat must also include the potential for unintentional misuse by an operator or other actor accessing the industrial control systems. User error could have just as much impact to system uptime and safety as malicious attacks. Access control therefore is a key component of defending against cyberthreats. During this session, we will be covering: the nature of both existing and emerging cyberthreats to ICS and why asset owners need to pay attention to them, Strategies and frameworks for defending your ICS against known and unknown threats and next-generation technologies that enable fine-grain visibility, role-based access control, and threat prevention for targeted attacks.

  • 12:40 to 13:00
    Q&A - Morning Lectures
  • 13:00 to 14:00
    Lunch
  • 14:00 to 14:40
    Thiago Braga Branquinho
    Code: PT-CLASS10
    Automation security for corporate sustainability
    More information

    Thiago Braga Branquinho

    Automation security for corporate sustainability

    PT-CLASS10

    The present study shows how automation security controls can contribute to corporate sustainability. Relationships between the control objectives in automation, interpreted in ANSI/ISA-99 with sustainability indicators of the Global Reporting Initiative (GRI) and the definitions of ISO 26000 (Corporate Social Responsibility) standard were established. The main objective is to expand the perspective on security controls, so these controls will stop being interpreted merely as a cost and become instruments of social investment and environmental preservation. Controls with sustainable bias increase transparency, governance, investor confidence, the company's image and therefore its market value.

  • 14:40 to 15:20
    Valéria Alves
    Code: PT-CLASS06
    Implementation of the ANSI/ISA 99 standard - UTE do Atlântico - A successful case
    More information

    Valéria Alves

    Implementation of the ANSI/ISA 99 standard - UTE do Atlântico - A successful case

    PT-CLASS06

    The growing need of the protection of industrial networks is driving corporations to adopt the use of technical standards related to information security, to direct and control the actions of corrective and predictive measures. The Thermoelectric Atlântico, installed on Thyssenkrupp CSA steel complex, adopted the ANSI/ISA 99 as the standard for improvement of security processes on the industrial network. With the implementation of controls, processes and environmental management, security management has become a great business value item. We will present the pioneering project carried out in the complex, addressing the benefits of implementation, the most difficult points and opportunities for improvements identified for the future.

  • 15:20 to 16:00
    Alexandre Euclides Ferreira
    Code: PT-CLASS21
    Constructive Tension: The Vendor/Researcher Relationship
    More information

    Alexandre Euclides Ferreira

    Constructive Tension: The Vendor/Researcher Relationship

    PT-CLASS21

    In his presentation, Mr. Brian will discuss the complex nature of the vendor and security researcher relationship. Responsible disclosure of product security vulnerabilities requires a level of trust between parties, and satisfactory execution by each party can lead to a deeper cooperative relationship going forward. For researchers, realistic expectations will be discussed and a recommended approach for a successful vendor engagement will be provided.

  • 16:00 to 16:20
    Interval
  • 16:20 to 17:00
    Leonardo Bonomi
    Code: PT-CLASS22
    How attacks to SCADA infrastructure initiate?
    More information

    Leonardo Bonomi

    How attacks to SCADA infrastructure initiate?

    PT-CLASS22

    The lecture will present attempts and the types of attacks that were carried out against the Trend Micro Brazil honeypot, which was especially created to attract the targeted environments and SCADA infrastructure threats. The entry points of these threats to the SCADA network will be presented, together with the best security strategy.

  • 17:00 to 17:40
    Mike Firstenberg
    Code: PT-CLASS24
    Innovating Industrial Perimeter Security: Revolutionizing ICS perimeter security with technologies that are stronger than firewalls
    More information

    Mike Firstenberg

    Innovating Industrial Perimeter Security: Revolutionizing ICS perimeter security with technologies that are stronger than firewalls

    PT-CLASS24

    New designs for security perimeters showcase technology to dramatically improve security. Increasingly, owners of critical infrastructure are concerned that conventional IT security mechanisms, including firewalls, anti-virus, and encryption, are not sufficient to secure critical applications. The mechanisms for defeating these protections are too widely known, and are too easily accomplished. From securing the exchange of data, to enabling secure central management of resources, industry-leading utilities and asset owners are looking for new solutions. This session details the new technology available to protect the safe and reliable operation of our systems from online external attack. We explore how innovative technical solutions are being deployed into these demanding applications in new ways to provide stronger security than is possible with firewalls. An examination of the new industry best practice of deploying Unidirectional Security Gateways for the protection of critical infrastructure and industrial control systems is included.

  • 17:40 to 18:00
    Q&A - Afternoon Lectures
  • 18:00 to 20:00
    Cocktail and Autograph session of the book "Security Industrial Automation and SCADA", published by TI Safe

11/06/2014 (Thursday)

  • 8:00 to 9:00
    Breakfast and registration
  • 9:00 to 9:40
    Olive Narr
    Code: PT-CLASS20
    Trends of Cyber Security and its importance for Industrial Automation facilities
    More information

    Olive Narr

    Trends of Cyber Security and its importance for Industrial Automation facilities

    PT-CLASS20

    In his presentation David will give a short review over the past major vulnerabilities the automation Industry and especially Siemens had to face. During this review David will point out the trends of cyber security and will address the importance for industrial automation facilities. In the main part, David will show the Siemens Security concept following the ISA 99 recommendation of Defense in Depth, before he will give a deep insight into a company’s process improvements. Since delivering secure products is strongly related to secure processes, David will explain in the end how Siemens improved and redesigned their PLM process and how the customers take benefit from that.

  • 9:40 to 10:20
    Jonathan Knudsen
    Code: PT-CLASS14
    Managing A Legacy of Vulnerabilities in Control Systems - Lessons Learned from Heartbleed and More
    More information

    Jonathan Knudsen

    Managing A Legacy of Vulnerabilities in Control Systems - Lessons Learned from Heartbleed and More

    PT-CLASS14

    Discovering vulnerabilities in the code that runs on critical systems early in development is the ideal way to effectively manage software robustness and security. Once a vulnerability becomes part of a system deployment, it can be considered a legacy issue, and it then becomes a race against time to eliminate it before it contaminates the critical system it manages. Unfortunately, many critical systems deployed today contain many well known vulnerabilities out of the gate, and there are some, like Heartbleed, which are yet to be discovered. Join this session for a discussion of what is know about deployed systems today, and how ICS experts can manage vulnerabilities today, and going forward.

  • 10:20 to 11:00
    Leonardo Cardoso
    Code: PT-CLASS03
    Technical and Legal developments of an industrial security incident
    More information

    Leonardo Cardoso

    Technical and Legal developments of an industrial security incident

    PT-CLASS03

    The purpose of this lecture is to present best practices for identifying security incidents in real-time industrial autnetworks and what should be done to avoid the worst in the administrative, technical and legal fields. The ongoing challenge of managing and mapping audit trails for digital forensics in case of legal liabilities in mission critical situations 24 x 7 x 365.

  • 11:00 to 11:20
    Interval
  • 11:20 to 12:00
    Marcelo Branquinho and Jan Seidl
    Code: PT-CLASS33
    Detecting problems in industrial networks through continuous monitoring.
    More information

    Marcelo Branquinho and Jan Seidl

    Detecting problems in industrial networks through continuous monitoring.

    PT-CLASS33

    Automation networks offer a range of real-time applications and data, making necessary the continuous monitoring of the quality of services. The parameters of QoS (Quality of Service) seek to address priorities, bandwidth allocation and network latency control. There are several QoS parameters to characterize a computer network, and that can be used for monitoring purposes. Each SCADA network, in a healthy state, presents a specific QoS which rarely changes given the repetitive process of the IACS operations. The continuous monitoring of QoS parameters of an automation network may anticipate problems such as malware contamination and equipment failures like switches and routers. It is very important to be aware of these changes in behavior in order to receive alerts and promptly handle them, avoiding incidents that could compromise the operation of the network and be financially or environmentally costly. In addition to the monitoring of network traffic, it is also necessary to monitor resource consumption of critical servers, such as the processing (CPU), memory, storage capacity and hard disk failures, among others. This work aims to establish a method by which SCADA security professionals can differentiate and qualify any problems that may be occurring through continuous monitoring of the automation network performance parameters giving a more behavioral approach than current signature-based ones. We presented a series of tests conducted in our laboratories in order to measure the performance of a simulated automation network parameters using a small SCADA network sandbox. First we measured the normal operating parameters of the network and reap its main graphics obtained with the proper tools. In a second step we practiced several attacks against the simulated automation network. During all attacks we collected the operating parameters of the network and its main graphics. At the conclusion of the work we compared the graphs of the network in healthy state with the graphs of the network with the security incidents described above. We detailed how the network parameters were affected by each kind of incident and built a table showing the way the main parameters of an automation network were affected by the attacks.

  • 12:00 to 12:40
    Tânia Mara Pereira Marques
    Code: PT-CLASS18
    Critical aspects of the design and security in the use of mobile solutions in automation distributed smart grid networks
    More information

    Tânia Mara Pereira Marques

    Critical aspects of the design and security in the use of mobile solutions in automation distributed smart grid networks

    PT-CLASS18

    The construction of intelligent distributed networks is done through the use of different communication technologies that must be integrated in a systematic way. This talk will discuss critical aspects of the design and implementation of mobile security solutions for distributed intelligent networks (SmartGrids).

  • 12:40 to 13:00
    Q&A - Morning Lectures
  • 13:00 to 14:00
    Lunch
  • 14:00 to 14:40
    Sergio Thompson-Flores
    Code: PT-CLASS26
    Integrating phisical and cibernetic security on the critical infrastructure protection: an holistic vision
    More information

    Sergio Thompson-Flores

    Integrating phisical and cibernetic security on the critical infrastructure protection: an holistic vision

    PT-CLASS26

    The critical infrastructure protection systems have several subsystems: cybernetic security, physical security, information security, environmental security, among others; however, in most of the cases, the subsystems are managed in an isolated manner by different teams, and there's little or none real time information exchange, which makes the managers' decision making very difficult, both to the planning and to the incident response. To integrate these information in real time, in a structured manner, so the operational and management teams could make faster and effective decisions, is the main challenge of the critical infrastructure security. In this lecture, we shown the technologies and methodologies available to create this integration presenting the Integrated Operations Centers case in different segments that were able to implement an integrated management of diverse security scopes.

  • 14:40 to 15:20
    Silvio Rocha da Silva
    Code: PT-CLASS16
    Security in operation control center for SCADA automation systems in water distribution
    More information

    Silvio Rocha da Silva

    Security in operation control center for SCADA automation systems in water distribution

    PT-CLASS16

    SCADA environments were protected from external attacks due to their proprietary protocols and isolated networks, but the arrival of the Ethernet standard resulted in an open automation platform that offers new options in terms of flexibility and connectivity, so it is usual to interconnect the automation environment to the corporate network and, in some cases, with the Internet itself. Automation users are aware of their dependence on the operation of information technology systems and their vulnerabilities, however, rarely protection measures necessary for the automation environment are adopted. Based on this problem and the current technological development which is the area of information security, the objective of this lecture is to explain about a proposed conceptual architecture of network security, manageability and availability, based on ISO 27002 and ISA 99 standards for automation environments in SCADA Control Operation Centers of the sanitation sector, with a primary focus on the water distribution process.

  • 15:20 to 16:00
    Fábio Rosa
    Code: PT-CLASS27
    Post-Prevention Era : how to get 100% visibility of advanced threats and fraud evidence before, during and after an event.
    More information

    Fábio Rosa

    Post-Prevention Era : how to get 100% visibility of advanced threats and fraud evidence before, during and after an event.

    PT-CLASS27

    To combat today’s sophisticated network attacks, you need a deeper understanding of everything that’s happening on your networks—all the activities, applications, and personas. And that requires more than data, analysis, and the latest signature-based preventative security tools.

  • 16:00 to 16:20
    Interval
  • 16:20 to 17:00
    Samuel Linares
    Code: PT-CLASS07
    Linking Critical Infrastructure Protection and Industrial Cybersecurity: Is there a Cyber-Tsunami in waiting?
    More information

    Samuel Linares

    Linking Critical Infrastructure Protection and Industrial Cybersecurity: Is there a Cyber-Tsunami in waiting?

    PT-CLASS07

    Description of the current socio-economic situation and the impact of the Critical Infrastructures Protection and Industrial Control Systems Security (or its absence) in our life (personal and professional), in our organizations and in our countries. • Linking Critical Infrastructures Protection and Industrial Cybersecurity: Understanding the risk. Analysis of the link between the industrial and corporate environments and its impact in key organizations for the survival of a country. • Current situation of the Industrial Security. Study and analysis of the convergence between industrial and corporate systems (or traditional IT), the impact, threat evolution, etc. Analysis of the security in industrial systems. • Organizational and Management Aspects: IT Manager vs. CSO/CISO vs. Plant Manager vs. Manufacturing Manager. Human aspects of industrial environments security and critical infrastructures protection. • Key facts (earthquakes) in our environment: Stuxnet, Duqu, Project Basecamp, CIP regulation, Smart Grid, Cyber Security Reports, Horizon 2020, ISA 99, Flame…Today’s Industrial Cybersecurity Landscape in depth analysis: Tsunami is arriving.

  • 17:00 to 17:40
    Diego Bernal
    Code: PT-CLASS32
    The current industrial cyber security status in Colombia.
    More information

    Diego Bernal

    The current industrial cyber security status in Colombia.

    PT-CLASS32

    The lecture will briefly present the current state of industrial cyber security in Colombia

  • 17:45 to 18:00
    Q&A - Afternoon Lectures

11/07/2014 (Friday)

  • 8:00 to 9:00
    Breakfast and registration
  • 9:00 to 9:40
    William Beer
    Code: PT-CLASS08
    Threat Horizon for 2015 - More danger from the existing threats.
    More information

    William Beer

    Threat Horizon for 2015 - More danger from the existing threats.

    PT-CLASS08

    Understand the threats is critical to enterprise risk management. Threats need to be evaluated in the organizational context to determine the risk. The Threat Horizon report of this year shows that the greatest risk comes from known threats. The fact hacktivism and malicious software exist for some time does not mean they are less threatening and we can relax - instead. Known threats, as they are mature, they are more dangerous and pose a greater risk than ever for organizations. They are more sophisticated and more effective. The fact that they are old or new is far less important than its potential to cause harm. The ISF annual report of Threat Horizon provides a practical way for organizations to have a vision of growing threats in this modern world always connected and interconnected. This, in turn, permits a strategic and better prepared to manage and mitigate risk approach.

  • 9:40 to 10:20
    Leonardo Scudere
    Code: PT-CLASS28
    Behavioral Analysis and Artificial Intelligence applied to SCADA Security Systems
    More information

    Leonardo Scudere

    Behavioral Analysis and Artificial Intelligence applied to SCADA Security Systems

    PT-CLASS28

    The speech will show through real examples how the unique artificial intelligent & behavioral recognition techniques with over 100 patents achieved by BRS Labs are able to effectively provide a breakthrough advance in the security enhancements of the Scada systems all over in the world.

  • 10:20 to 11:00
    Marina Krotofil and Mona Lange
    Code: PT-CLASS11
    Mission Impact Modelling for Industrial Control Systems
    More information

    Marina Krotofil and Mona Lange

    Mission Impact Modelling for Industrial Control Systems

    PT-CLASS11

    In this paper we present our initial approach to mission impact modeling for ICS. Compared to previous works on mission modeling which had its focus on IT (or cyber) realms we also include the underlying physical processes in our considerations. We will show that physical and cyber terrains are orthogonal and have to be analyzed by distinct knowledge disciplines. Specifically, we introduce such terms as tasks and services to capture missions and business process dependencies on supporting networks and systems in a repeatable manner. We introduce a new layered approach to the analysis of the infrastructure dependencies and their impact on the health of the process control systems. We introduce a set or process-oriented security metrics to facilitate qualitative evaluation of the impact of a cyber attack on the operational goals set for the missions. We also integrate a notion of time which is important since the duration of an incident will often affect the amount of impact an incident will have.

  • 11:00 to 11:20
    Interval
  • 11:20 to 12:00
    Cesar Oliveira
    Code: PT-CLASS29
    Concept and design of integrated program of information security for automation
    More information

    Cesar Oliveira

    Concept and design of integrated program of information security for automation

    PT-CLASS29

    Information security is a growing subject within the Operational Technology environment. Just as for other breaches that occurred, large companies perform a leading role also when it comes to information security. Large companies, in general, have different facilities. In this case, when it comes to information security, it is essential that risks be identified and controls be defined and deployed in an integrated manner, so that vulnerabilities when exploited do not affect the business as a whole. Thus, it is strongly recommended the adoption of a program of information security with the participation of various facilities instead of isolated projects. This paper presents a strategy for the development of this program by adapting best practices and frameworks of reference, such as ISA-62443 and NIST SP 800-82. The phases of conception and design of the program are covered, taking as reference case the Program Cyber Security for Industrial Automation Systems of Vale. This program is designed to be comprehensive in the aspects of information security, considering the individual situation of each mine, plant or port involved, and structured so as to be easily expanded to other facilities.

  • 12:00 to 12:40
    Ilan Barda
    Code: PT-CLASS31
    Integrated Physical & Cyber security for distributed SCADA systems.
    More information

    Ilan Barda

    Integrated Physical & Cyber security for distributed SCADA systems.

    PT-CLASS31

    According to the NIST security framework and NERC CIP v5, Identity management is a key security vulnerability for sub-station automation deployment that should be addressed. Special emphasis is on Identity management of users in remote sub-stations. This focus can be seen in NIST NCCoE use-case (http://nccoe.nist.gov/?q=content/energy). An attacker can easily bypass the physical access control to such a remote sub-station and once connected to the sub-station network can get unlimited access to the automation devices in this sub-station and in other connected sites. We will describe an integrated physical & cyber security solution that correlates between the physical access control in a remote sub-station to the dynamic RBAC (Role-Based-Access-Rights) allocated to the user connected to the sub-station network. Such RBAC validation is done using DPI of the SCADA protocols throughout the network. As such any user that is an insider in the network still has limited operational permissions as if he was escorted in the cyber corridors. This solution is developed by RADiFlow in co-operation with vendors of physical access-control and SIEM tools and with the endorsement of NCCoE.

  • 12:40 to 13:00
    Q&A - Morning Lectures
  • 13:00 to 14:00
    Lunch
  • 14:00 to 14:40
    Jan Seidl
    Code: PT-CLASS02
    SCADA hacking: industrial scale fun
    More information

    Jan Seidl

    SCADA hacking: industrial scale fun

    PT-CLASS02

    Devices and SCADA networks are increasing more and more in the interest of criminals, military and even governments, due to its high impact and practically nonexistent security that takes us to the beginnings of "networked" life - in fact, for these devices, this is really the dawn of life on TCP/IP and it brings back all the basic vulnerabilities commonly found in IT networks.

  • 14:40 to 15:20
    Regis Carvalho
    Code: PT-CLASS15
    The importance of SCADA honeypots for the Brazilian electrical sector
    More information

    Regis Carvalho

    The importance of SCADA honeypots for the Brazilian electrical sector

    PT-CLASS15

    Critical infrastructures are institutions that provide the livelihood of a nation. If attacked by a threat can affect the life of society and especially the national security. Honeypots are detecting sensors widely used internationally in research aiming the detection of cyber attacks. Critical infrastructures of the international electricity sector has been increasingly targeted by cyber attacks. This paper presents recent results obtained from Eletrobrás Brazilian Honeypots Alliance, also showing the results of experiments performed with Honeypot CLP, used for research within the electricity sector.

  • 15:20 to 16:00
    Felipe Peñaranda
    Code: PT-CLASS19
    Perimeter security intelligence in industrial networks
    More information

    Felipe Peñaranda

    Perimeter security intelligence in industrial networks

    PT-CLASS19

    Protecting the security of SCADA networks and process management systems is critical for industries and organizations. In fact, online threats to SCADA systems security may pose as much risk for potentially significant failure within a critical infrastructure system as a physical attack. Networked SCADA systems are vulnerable to the same threats as the standard operating systems and network infrastructure on which they rely. The presentation will show how a Network IPS (Intrusion Prevention System) can be used to improve perimeter security in automation networks, a current requisite of the ANSI/ISA-99 standard.

  • 16:00 to 16:20
    Interval
  • 16:20 to 17:00
    Rafael Soares
    Code: PT-CLASS05
    Vulnerability management in industrial control systems
    More information

    Rafael Soares

    Vulnerability management in industrial control systems

    PT-CLASS05

    This talk will demonstrate how to ensure the management of vulnerabilities in industrial control systems. While there are some similarities to the analysis in corporate systems (IT networks), the analysis of vulnerabilities in industrial environments have specific characteristics that influence their criticality, defense mechanisms and how to manage vulnerabilities and security threats.

  • 17:00 às 17:20
    Q&A - Afternoon Lectures
  • 17:20 às 17:30
    Closing of the conference

* All schedules and lecture contents may be changed without prior notification.

Speakers

Marcelo Branquinho

TiSafe

CEO

Brazilian

Marcelo Branquinho is a SCADA security expert and an electrical engineer who specializes in computer systems.
Read more
Branquinho has an M.B.A. in Business Management and is founder and CEO of TI Safe Segurança da Informação. A senior member of ISA International, he has over 15 years in the field of critical infrastructures and SCADA Systems and is the coordinator of the TI Safe´s Security Automation Training, the first Brazilian in this segment. He is also a member of the ANSI/ISA-99 standard working group. He is a published author and frequent presenter of technical papers.
Minimize

Delfin Rodillas

Palo Alto Networks

Gerente de Produto Senior - SCADA Architect

American

Delfin Rodillas is a Senior Product Marketing Manager at Palo Alto Networks with focus on cybersecurity for SCADA and Industrial Control Systems. His role is
Read more
dedicated to engaging with customers and other industry stakeholders on solutions and requirements spanning Utilities, Oil & Gas, Mining, Manufacturing and other critical infrastructure sectors. Rodillas is a seasoned technology industry veteran with over 17 years’ experience spanning Security, Networking, Aerospace/Defense, and Semiconductors.  Prior to Palo Alto Networks, Rodillas held a variety of leadership roles in strategic and product marketing, business operations, and engineering at Xilinx, Inc. and MIPS Technologies. Rodillas holds both MSEE and BSEE degrees from Santa Clara University and an MBA from the Wharton School of the University of Pennsylvania.
Minimize

Thiago Braga Branquinho

TiSafe

Founder

Brazilian

Thiago Branquinho is a biologist and Certified Information Systems Auditor (CISA). In 18 years of experience, developed activities on life
Read more
sciences, sustainability, business management and information security. Co-founder of TI Safe and CEO of bioiniciativa. Recently, he managed the strategic planning and participated on the development of the sustainability management system for the 2014 FIFA World Cup.
Minimize

Olive Narr

Siemens

Marketing Manager Industrial Security

Germany

Oliver joined Siemens in 2001 as he started an apprenticeship as an associated engineer for automation systems. After several positions within
Read more
Siemens, such as software developer, team lead and lean software development coach, Oliver Narr joined the Siemens Security Network in 2014 and took over the Marketing responsibility for Industrial Security. Oliver holds MSc in Information Systems.
Minimize

Franzvitor Fiorim

Tred Micro

Sales Engineer

Brazilian

Franzvitor is Sales Engineer at Trend Micro Brazil, working directly on large accounts in Brazil. Has over eight years of experience in information security,
Read more
actively participating in major projects from financial institutions, energy and public enterprises. He is a direct collaborator in research related to analysis of traffic and advanced threats.
Minimize

Renato Mendes

TiSafe

Special Projects Division Manager

Brazilian

Renato Mendes is an Electronic Engineer with specialization in computing performed in the U.S. and Germany and an MBA in business
Read more
management. Working for more than 25 years in design and development of systems for industries from various sectors in Brazil and abroad. Participated in the implementation of dozens of projects in critical infrastructure systems integrating IT and automation. Participated in the first initiatives in Brazil in the area of protection of industrial data. Currently working with the TI Safe as consultant and being responsible for the protection of industrial systems and databases.
Minimize

Jason Larsen

IO Active

CyberSecurity Researcher

American

Having spent the last decade working on the security the critical infrastructure, Jason Larsen can definitely say he was hacking SCADA
Leia mais
systems before it was cool. Jason works in the technical aspects of hacking critical infrastructure and lives in the bits and bytes of control systems. His specialty is remote physical damage. Prior to returning to IOActive, Jason worked for the Idaho National Labs where he performed security assessments of the software that runs the critical infrastructure. Over his tenure there he did full assessments of all of the major power control systems vendors. In addition to laboratory tests he has performed live penetrations of power grids in multiple countries resulting in control of electric power for a short period of time. Other sectors include chemical manufacturing, pharmaceuticals, petroleum, and water. Before his career in SCADA security Mr. Larsen bounced between a number of other fields. Some of the random jobs of note include modeling neutron beams for use in treating brain tumors, writing software to analyze nerve impulses, writing one of the first intrusion prevention systems, the analyst of last resort for critical infrastructure malware, and two years on the Window 7 penetration testing team.
Minimizar

Regis Carvalho

Eletronuclear

M.Sc. - Systems and Computing - Cyber Defense

Brazilian

Regis Carvalho is a System Analytics at Eletrobras Eletronuclear, graduated in Computer Science, specialized in Logistic business and master in
Read more
Systems and Computing at IME - Military Engineer Institute, on the research line of Cyber Defense. He's a member of the Subcommittee of TIC Security of the Eletrobras' system. Currently working with TI Management and Information Security.
Minimize

Valéria Alves

Thyssenkrupp CSA

IT Specialist

Brazilian

Valeria Alves is a MSc student at Technology, has a MBA in Management and Information Systems by UFF and Governance and Best
Read more
Practices of IT by Infnet Institute. Actualy is a Information Technology Specialist at Thyssenkrupp Siderúrgica do Atlântico. Has over 15 years of experience in information technology with an emphasis in Network Architecture, Networks Industrial Automation and Information Security.
Minimize

Cesar Oliveira

Vale

Global IT Security Manager

Brazilian

Information security is a growing subject within the Operational Technology environment. Just as for other breaches that occurred, large
Leia mais
companies perform a leading role also when it comes to information security. Large companies, in general, have different facilities. In this case, when it comes to information security, it is essential that risks be identified and controls be defined and deployed in an integrated manner, so that vulnerabilities when exploited do not affect the business as a whole. Thus, it is strongly recommended the adoption of a program of information security with the participation of various facilities instead of isolated projects. This paper presents a strategy for the development of this program by adapting best practices and frameworks of reference, such as ISA-62443 and NIST SP 800-82. The phases of conception and design of the program are covered, taking as reference case the Program Cyber Security for Industrial Automation Systems of Vale. This program is designed to be comprehensive in the aspects of information security, considering the individual situation of each mine, plant or port involved, and structured so as to be easily expanded to other facilities.
Minimizar

Jonathan Knudsen

Codenomicon

Principal Security Engineer

American

Jonathan Knudsen is a Principal Security Engineer for Codenomicon, where he enjoys breaking software. Jonathan is the author of books about
Leia mais
2D graphics, cryptography, mobile application development, Lego robots, and pregnancy. Jonathan has tested and broken multiple industrial controllers by fuzzing multiple network protocols. He is one of the authors of the Fuzz Testing Maturity Model (http://www.codenomicon.com/resources/ftmm.shtml), a document that gives vendors and purchasers a common scale to describe levels of fuzz testing. He lives with his wife, four children, and a Cairn Terrier in a noisy house in North Carolina.
Minimizar

Sergio Thompson-Flores

Módulo

CEO

Brazilian

Mr. Thompson-Flores was the principal and founding partner of Worldinvest, a financial advisory and business development firm in Brazil, from 1996 to
Leia mais
2006. Prior to Worldinvest, he was the managing director of a Brazilian development bank with active private equity practice. Previously, he was a diplomat in the Brazilian Foreign Service and served in a senior position in the Brazilian Finance Ministry. He holds a Master’s degree and a Bachelor’s degree in International Relations from Instituto Rio Branco.
Minimizar

Samuel Linares

CCI

Director at CCI

Spanish

Samuel Linares is Director at Industrial Cybersecurity Center, European Commission Independent Evaluator, ENISA (European
Read more
Network and Information Security Agency) CIIP Expert and member of ISACA Cybersecurity Task Force. With 2 decades of security, system integration and multinational and multicultural projects management experience, he has been the main promoter of the “Industrial Cybersecurity” concept in Spanish, being recognized as one of the key Spanish and Latin-american experts in the area and participating as speaker, chairman and teacher in different events all over the world (including Spain, UK, USA, Belgium, Qatar, United Arab Emirates, Mexico, Cuba or Argentina, among others).

He holds various cybersecurity certifications including GICSP (Global Industrial Cyber Security Professional), CRISC (Certified in Risk and Information Systems Control), CGEIT (Certified in Governance of Enterprise IT), CISM (Certified Information Security Manager), CISA (Certified Information Security Auditor), CISSP (Certified Information Systems Security Professional), GIAC Assessing Wireless Networks (GAWN), Systems and Network Auditor (GSNA), and Google Hacking & Defense (SSP-GHD), BSI BS 25999 & BS 7799 Lead Auditor (since 2002), and several additional vendor specific technical certifications. He holds a B.S. in Computer Science from the Univ. de Oviedo and is University Specialist in Data Protection by the Colegio Universitario Escorial Maria Cristina.
Minimize

Jan Seidl

TiSafe

CTO

Brazilian

Jan Seidl is expert in *NIX systems, BSD, C & Python. Security professional and researcher, focused on SCADA security,
Read more
dedicated pen-tester and malware reverse analyst with large experience administering servers, networks and applications’ security. Author of the http://wroot.org information security blog with several published technical papers, is currently CTO of TI Safe Segurança da Informação.
Minimize

Fábio Rosa

Promon Logicalis Blue Coat

Telecommunications engineer

Brazilian

Telecommunications engineer with 11 years experience on the security and networking markets. As an Enterprise Solutions Architect at Blue Coat
Read more
Systems, support customers from various segments on the americas region, on the adoption of security best practices. Acts as a trusted advisor for a select number of companies, assisting them to use information security as a business enabler.
Minimize

William Michot

California Water Service Company

SCADA System Administrator

American

William Michot is responsible for implementing SCADA Cyber Security for California Water Service Company where he is the SCADA System
Read more
Administrator. He is a Linux expert with extensive experience building proprietary security appliances. His latest project is the Secure Multi-access Gateway that provides both high security and high availability for a SCADA network for the entire state of California. He has considered a wide range of threat scenarios and made extensive use of re-configurable multimedia WANs for a network that is shared between SCADA and Information Technology.
Minimize

Leonardo Cardoso

TiSafe

Regional Manager

Brazilian

Leonardo Cardoso is a systems analyst with specialization in information security with 20 years of experience in information
Read more
technology. He is a published author and Forensics expert, is currently the Northeast Regional Manager of TI Safe Segurança da Informação.
Minimize

Tânia Mara Pereira Marques

SANEPAR

Distributed Automation Senior Specialist

Brazilian

Tânia Marques is an expert in distribution automation and Telecommunication Engineer, master in automation and specialized in networks,
Read more
teleinformatics and MBA in Team Management. Sênior member of ISA District 4 and ISA Curitiba Section. She is a technical member of the Parana government project for smartgrid. She is also a published author in many technical magazines and conferences.
Minimize

Silvio Prestes

IPT - Instituro de Pesquisas Tecnológicas

Master in Computer Engineering - Software Engineering

Brazilian

Silvio Bonete Prestes is a MSc student at Instituto de Pesquisas Tecnológicas – IPT, graduated in Informatic and MBA in Business Management
Read more
by FIA and specialization at “Quality in Software Development”. Has over 20 years of professional experience in bank automation market and after coordinate several projects in Brazil and abroad, coordinate presently strategic projects at Diebold Brazil.
Minimize

Daniel Guillize

IPT - Instituro de Pesquisas Tecnológicas

Master in Computer Engineering - Software Engineering

Brazilian

Daniel Guillize is Master student in Computer Engineering at Institute of Technological Research - IPT. He graduated in Electronics
Read more
Engineering at FEI and has over 20 years of experience in automation in Energy field. Works on development of SCADA systems and controllers for the largest companies in Brazil. He is currently a consultant and developer of solutions for integration between SCADA systems and enterprise.
Minimize

Silvio Rocha da Silva

Instituto de Pesquisas Tecnológicas do Estado de São Paulo - IPT

Information Technology Manager

Brazilian

Silvio Rocha is a graduate student in Computer Engineering at IPT with specialization in Strategic Business Administration and Computer
Read more
Science. He currently works in the Sanitation Company of the State of São Paulo - SABESP, playing the role of IT Manager in the East Business Unit. Teaches more than 10 years in various disciplines of undergraduate courses in the area of information systems, computer science and computer networks. Consultant and trainer in IT management by IT Passport and certified in ITIL, ISO / IEC 20000 and ISO / IEC 27002.
Minimize

Marina Krotofil

Hamburg University of Technology

Research Assistant

Germany

Marina Krotofil is a Research Assistant at Hamburg University of Technology (Germany), where she is teaching security subjects and
Read more
finalizes PhD in ICS security. Marina has maintained her industry-oriented research focus through collaborations with several industrial partners, participation in the EU projects and research internship at Shell in the area of process automation, control and optimization. She also worked part time an ICS Security Engineer at Compass Security AG. In the course of her research career she gave talks at S4 (Digital Bond), NIST and at the industrial events. She holds MBA in Technology Management, MSc in Telecommunications, MSc in Information and Communication Systems.
Minimize

Mona Lange

Hamburg University of Technology

Research Assistant

Germany

Mona Lange is a Research Assistant at Hamburg University of Technology (Germany), where she is pursuing her PhD in Software Systems. She is
Read more
working on the EU-funded project PANOPTESEC. Mona's task is capturing missions (or business/operations processes) dependencies on supporting networks and systems and determination of impacts of the security events on the missions. Mona holds MSc in Computer Science. She did her university internship at IBM.
Minimize

Alexandre Euclides Ferreira

Siemens

Consulting R&D Engineer

Brazilian

Technical Consultant for industrial communication with Technologies Ethernet, Wireless, Industrial Network Security and Remote Access, Specialist
Read more
on Computer Network and Telecomunication.
Minimize

Diego Bernal

Identian

Commercial Manager

Colombian

Diego Bernal is the Commercial Manager of Identian, the main Colombian integrator in the industrial cyber security market.

Felipe Peñaranda

IBM

IBM Security Systems Tiger Team

Brazilian

Felipe Peñaranda is a Computer Engineer graduated at UNICAMP and MBA in Administration by FGV. With more than 10 years working with
Read more
Information Security, Felipe has worked in projects focused on Compliance and Risk Management, Identity and Access Management and Security Intelligence. Felipe is currently part of the IBM Tiger Team and has also worked on companies such as CA and Price Waterhouse.
Minimize

William Beer

ISF - Information Security Forum

Official representative

Brazilian

William Beer is a leading authority on cyber security with over 25 years of diverse international consulting experience advising on
Read more
and managing cyber and information risk for large global clients. Based in Brazil, William is the official representative of The Information Security Forum and works with Members from many of the world's major corporations, public sector bodies and government departments. Mr. Beer is also a Managing Director with Alvarez & Marsal and leads the Cyber Protection business in South America. Prior to joining Alvarez & Marsal, Mr. Beer was a Director with PwC’s UK Information & Cyber Security practice, where he helped drive the UK wide cyber and information security business.
Minimize

Rafael Soares

Clavis

CTO

Brazilian

Rafael Soares Ferreira is the CTO of Clavis Information Security Group. Active professional in the areas of intrusion and
Read more
network audits , testing systems and applications , and detection and response to security incidents . Has provided services and taught courses and seminars on information security for large national , international, public and military organs and companies, as well as in several events. He possess the following international certifications CEH v8 ( Certified Ethical Hacker ) , ECSA v4 ( EC-Council Certified Security Analyst) , CHFI v8 (Computer Hacking Forensic Investigator ) , CompTIA Security + , SANS SSP - CNSA ( Stay Sharp Program - Computer and Network Security Awareness ), ENSA v4.1 ( EC-Council Network Security Administrator ), and got recognition as Licensed Penetration Tester (LPT) by the EC-Council.
Minimize

Mike Firstenberg

Waterfall

Director of Industrial Security

American

Mike Firstenberg is the Director of Industrial Security for Waterfall Security. Mike brings more than 15 years in Control System Security, specializing in Control
Read more
System Cyber Security. With a proven track record as a hands-on engineer - researching, designing, and implementing strategic security solutions, Mike has an established background working with governmental institutions, regulatory authorities, and Industrial utilities. The former chair of the American Water SCADA Council, Mike studied Computer Science, Chemical Engineering, and Mathematics from the University of Pennsylvania, and has served as a speaker and panelist at numerous conferences and events.
Minimize

Leonardo Scudere

BRS Labs

Director

Brazilan

Master in International Business Management from Thunderbird, "The American Graduate Scholl of International Management", Phoenix, USA; Obtained
Leia mais
certifications in Security Methodologies by Carnegie Mellon University, Pittsburgh, from SEI (Software Engineering Institute) and US-CERT (Command and Control of Emergence and Response Teams) in Areas of: CSIRTs (Managing Computer Security Incident Response Teams), OCTAVE (Operationally Critical Threat, Asset and Vulnerability Evaluation) and Gathering Evidence & Forensics Investigations. He founded and was the 1st. President of the Brazilian Chapter of HTCIA Brazil (High Technology Crime Investigation Association). Latin America Managing Director at BRS Labs, Inc from previous positions as: Vice President, Latin America at CA, Senior Director of IBM Latin America in Risk Management and Tivoli Software Division, Founder & President of Internet Security Systems (ISS) for Brazil & Mercosur, Director of Oracle and Banco BBVA Author of books: ""Digital Risk"" by Editora Campus & Elsevier (2006), co-author of ""Law of Electronic and Internet Guide” by Editoria Lex and “Digital Risk in the Web 3.0” (late 2014). He is currently Managing Director & Partner of Cyberbric, Latin America Executive Director for Narus (Boeing subsidiary) and Business Development Consultant for The BOEING Corporation in the Defense & Security Division (BDS).
Minimizar

Ilan Barda

RADiFlow

CEO, RADiFlow

Israeli

Ilan Barda is a cyber-security and communication executive with 20years of experience in this market. In 2009 he founded RADiFlow and is active as the CEO
Read more
up-to-date. RADiFlow provides cyber-security solutions for distributed automation networks of critical infrastructure utilities. Typical applications are the Electricity Smart-Grid, the modern Smart-City, Oil & Gas and Intelligent Transportation. Prior to founding RADiFlow, Mr. Barda was the CEO of Seabridge, a Siemens subsidiary, which later became the Carrier-Switches business-line of Nokia Siemens Networks. In this capacity he had P&L responsibility for about $100M annual revenues with a team of 500 people distributed world-wide.Mr. Barda has a wide technical experience in secure communication solutions from his R&D roles in the years 1990 to 2005. In these years he served in the Israeli Defense Forces and in various R&D management roles in global ICT vendors.
Minimize

Preliminary Schedule of Courses - CLASS 2014

Local: Training Room

11/05/2014 (Wednesday)

  • 8:00 to 9:00
    Breakfast and registration
  • 9:00 to 13:00
    Alexandre Freire
    Code: MC-CLASS03
    Modernizing cybersecurity infrastructure: Architecture of Defense for Automation Networks
    More information

    Alexandre Freire

    Modernizing cybersecurity infrastructure: Architecture of Defense for Automation Networks

    MC-CLASS03
    Course Language: Portuguese
    Level: Intermediary/Advanced

    • Segmentation of operative networks
    • Creation of zones and sub-zones of security in operating and corporate networks
    • Traffic classification for identification in Layer 7 port independent applications
    • Parallel Processing and high performance
    • Access Control Model "least privilege" based on users, applications, assets and URL
    • Blocking threats and unauthorized actions from industrial protocols and applications
    • High granularity in protecting against threats in protocols such as Modbus, DNP3, ICCP and MQTT
    • Datacenter Security - application control, QoS, service HTTP filter, controlling the use of management (telnet, ssh, SNMP, FTP). Detection botnets and C&C.
    • Security in the Factory Floor - Restriction on the use of applications, protocols and restricting write commands to control devices. Blocking Malware and exploits.
    • Remote Access Security - VPN users and RDP (Terminal Services)
    • Allowing the controlled and safe use of web applications and SaaS
    • Integrated threat prevention control and risk reduction in control applications, traffic source, existing Threats and Unknown Threats
    • Virtual Patch - Protection of industrial systems that cannot be updated
    • Threat Vault and Exploits specific for protocols DNP3, ICCP and Modbus
    • Case study - malware for industrial environments: Stuxnet and Son of Stuxnet
    • Case study - malware for industrial environments: Arcom RAT
    • Concept of detection of unknown threats from the use of deep malware inspection and Sandbox Cloud Analisys
    • Centralized control of security gateways in the OT and IT networks - centralized administration for operation and compliance reports
    • Integration with SIEM systems for intelligence and security correlation
    • Deployment Scenarios: Palo Alto gateways for corporate and operating networks
    • Harsh Environments - VM appliances + Industrial ruggerized PC server for operation in industrial environments and adverse conditions
    • Questions and closing.

    About the speaker

    Palo Alto

    Alexandre Freire
    Systems Engineer
    Brazilian

    Alexandre Freire is an InfoSec and GRC Solution Architect working for IBM Brazil with more than 15 years of experience in designing solutions in order to reduce risks and frauds for the enterprise. Certified by SANS Institute (USA) in Defense Perimeter Technologies, is Professor of Rio de Janeiro Brazilian Federal University Computer Center since 2003. Received the ISSA SecMaster award for Best Editorial and Journalistic Contribution for InfoSec book published. "Como Blindar Seu PC", book written by Freire to cover Internet threats and security best practices to end users. Winner of Sans IDNET Challenge, an internacional hacking contest during Sans Institute annual conference in Florida (USA). Contributor of digital and printed brazilian press veichles regarding InfoSec subjects.

  • 13:00 to 14:00
    Lunch
  • 14:00 to 18:00
    Marcelo Branquinho
    Code: MC-CLASS01
    Defense in depth for automation networks acoording the ANSI/ISA-99 standard
    More information

    Marcelo Branquinho

    Defense in depth for automation networks acoording the ANSI/ISA-99 standard

    MC-CLASS01
    Course Language: Portuguese
    Level: Basic / Intermediary

    • Introduction to critical infrastructures
    • Threats to Automation Networks
    • Cyber War and cyber terrorists
    • Major attacks against automation networks
    • The need for security in industrial networks
    • The security standard ANSI/ISA-99
    • Defense in depth - The zones and conduits model
    • Security Solutions for Industrial Automation
    • Continuous monitoring and support
    • Questions and Closing.

    About the speaker

    TI Safe

    Marcelo Branquinho
    CEO
    Brazilian

    Marcelo Branquinho is a SCADA security expert and an electrical engineer who specializes in computer systems. Branquinho has an M.B.A. in Business Management and is founder and CEO of TI Safe Segurança da Informação. A senior member of ISA International, he has over 15 years in the field of critical infrastructures and SCADA Systems and is the coordinator of the TI Safe´s Security Automation Training, the first Brazilian in this segment. He is also a member of the ANSI/ISA-99 standard working group. He is a published author and frequent presenter of technical papers.

  • 18:00 to 20:00
    Cocktail and Autograph session of the book "Security Industrial Automation and SCADA", published by TI Safe

11/06/2014 (Thursday)

  • 8:00 to 9:00
    Breakfast and registration
  • 9:00 to 13:00
    Marcio Santos
    Code: MC-CLASS04
    Protection of security zones using industrial firewalls.
    More information

    Marcio Santos

    Protection of security zones using industrial firewalls.

    MC-CLASS04
    Course Language: Portuguese
    Level: Intermediary

    With the increasing use of Ethernet into the plant shop floor level, issues relating to industrial security are becoming increasingly important in industry. Connections from the factory floor to the corporate level of the company makes it possible to control and real-time monitoring of production, but are potential sources of vulnerability, if such connections are not properly protected. Security measures are vital to protecting the confidentiality and reliability of industrial networks against numerous attacks and espionage that a plant may be subject. Siemens can help you implement such measures through its concept of integrated Industrial security, present in their Industrial products. Through this mini-course, participants will be able to apply practical knowledge of the following:

    • Protection of automation systems, as recommended by the concepts of defense in depth;
    • Basic functions of security - Firewall, NAT / NAPT, DMZ and VPN
    • Equipment for industrial network security SIMATIC
    • Questions and Closing.

    About the speaker

    Siemens

    Marcio Santos
    Technical Consultant
    Brazilian

    Develops industrial automation systems, including automation systems for critical infrastructure (substations and hydroelectric plants) for the last 12 years. Expert in the SIEMENS SIMATIC control and supervision platform systems (SCADA WinCC, S7 controllers and SIMATIC NET Communication Networks). Enthusiast of industrial communication protocols, highlighting the IEC101/104, OPC, ICCP, IEC 61850, Modbus, Profibus and Profinet protocols. Worked in companies like Engecomp Technology, Voith Hydro and currently works as a technical consultant at Siemens Factory Automation Ltd., where is responsible for dissemination and technical consulting for the SIEMENS industrial automation portfolio. Currently part of SIEMENS Security Network, consulting for security products of industrial networks supplied by SIEMENS.

  • 13:00 to 14:00
    Lunch
  • 14:00 to 18:00
    Alfredo Oliveira
    Code: MC-CLASS02
    Protecting the perimeter before the attack hits the PLC
    More information

    Alfredo Oliveira

    Protecting the perimeter before the attack hits the PLC

    MC-CLASS02
    Course Language: Portuguese
    Level: Intermediary

    • Virtual Patching
    • Detecting attacks on vulnerabilities and exploits inside the network
    • Keeping your system unchangable
    • Questions and closing.

    About the speaker

    TrendMicro

    Alfredo Oliveira
    Digital Threats Researcher
    Brazilian

    Enthusiast of the GNU project despite having already worked, not by choice, with other environments where the roots were firm and strong in free software. Working in a security laboratory of a Japanese company, and working with passion.

11/07/2014 (Friday)

  • 8:00 to 9:00
    Breakfast and registration
  • 9:00 to 13:00
    Tânia Mara Pereira Marques
    Code: MC-CLASS05
    Critical aspects of the design and security in the use of mobile solutions for automation distributed smart grids
    More information

    Tânia Mara Pereira Marques

    Critical aspects of the design and security in the use of mobile solutions for automation distributed smart grids

    MC-CLASS05
    Course Language: Portuguese
    Level: Intermediary/Advanced

    • Introduction to smart grids
    • Components of mobile solutions
    • Critical design aspects of mobile solutions
    • Critical security aspects of mobile solutions
    • Applications of mobile solutions in smart grids
    • Questions and Closing

    About the speaker

    Sanepar

    Tânia Mara Pereira Marques
    Distributed Automation Senior Specialist
    Brazilian

    Tânia Marques is an expert in distribution automation and Telecommunication Engineer, master in automation and specialized in networks, teleinformatics and MBA in Team Management. Sênior member of ISA District 4 and ISA Curitiba Section. She is a technical member of the Parana government project for smartgrid. She is also a published author in many technical magazines and conferences.

  • 13:00 to 14:00
    Lunch

* All schedules and lecture contents may be changed without prior notification.

Sponsors and partners

Premium Sponsor

Platinum Sponsor

Gold Sponsor

Silver Sponsor

Partners

Organization

TiSafe Segurança da Informação