Archived Content
In an effort to keep CISA.gov current, the archive contains outdated information that may not reflect current policy or programs.ICSJWG Meetings and Webinars
ICSJWG Meetings and Webinars
Information about past ICSJWG meetings and webinars can be found below. Please contact us at ICSJWG.Communications@cisa.dhs.govwith any questions.
ICSJWG 2023 Spring Meeting in Salt Lake City
The Spring Meeting took place in-person in Salt Lake City, Utah on May 9 –11 at the Radisson Hotel Salt Lake City Downtown.
Capture the Flag
A virtual CTF activity began on Saturday, May 6 at 10:00 a.m. MT and ended on Thursday, May 11 at 12:00 p.m. MT. The CTF activity, oriented around an incident response scenario involving attacks on critical infrastructure, featured such critical infrastructure sectors as telecom, water purification, transportation, and electrical distribution.
Technical Presentations
CISA’s Threat Hunting provided presentations on "Hypothesis-Driven Approach to Threat Hunting," "Malcolm: Not Just Another Pretty Monitoring Tool," and "Cyber Performance Goals (CPG) Module Within CSET."
Cyber Defense Education & Training (CDET)
Network Discovery – Passive (0.1 CEU): This session discussed passive network discovery. The participants learned about and used safe network discovery practices regarding control systems and identified network details without sending network packets.
Network Discovery – Active (0.1 CEU): This training discussed active network discovery. The participants learned about and used active discovery tools to identify devices (targets) that cannot be otherwise identified using passive discovery techniques.
Cyber Defense Education & Training (CDET) Escape Room
CDET provided a Network Discovery Cyber Escape Room. The space station Asteroid Covenant had sent out a distress signal stating they had experienced a loss of its critical life safety control systems. The life safety systems (i.e., oxygen and HVAC systems) had failed, and there were only 60 minutes of air remaining before the demise of the crew. Participants were invited to be a part of the adventure! This escape room contained a series of traditional escape room puzzles mixed with cybersecurity elements that utilize passive and active network discovery tools and techniques. This session offered 0.1 CEU.
_____________________________________________________________________________
Previous Meetings:
- ICSJWG May 2023 In-Person Meeting (Salt Lake City, UT)
- ICSJWG September 2022 Virtual Meeting
- ICSJWG April 2022 Virtual Meeting
- ICSJWG September 2021 Virtual Meeting
- ICSJWG April 2021 Virtual Meeting
- ICSJWG September 2020 Virtual Meeting
- ICSJWG June 2020 Virtual Meeting
- ICSJWG August 2019 Meeting (Springfield, MA)
- ICSJWG April 2019 Meeting (Kansas City, MO)
- ICSJWG August 2018 Meeting (Cincinnati, OH)
- ICSJWG April 2018 Meeting (Albuquerque, NM)
- ICSJWG September 2017 Meeting (Pittsburgh, PA)
- ICSJWG April 2017 Meeting (Minneapolis, MN)
- ICSJWG September 2016 Meeting (Ft. Lauderdale, FL)
- ICSJWG May 2016 Meeting (Scottsdale, AZ)
- ICSJWG October 2015 Meeting (Savannah, GA)
- ICSJWG June 2015 Meeting (Washington, DC)
- ICSJWG October 2014 Meeting (Idaho Falls, ID)
- ICSJWG June 2014 Meeting (Indianapolis, IN)
- ICSJWG November 2013 Meeting (Rockville, MD)
Information about our June Quarterly Webinar!
Aleksandra Scalco with International Council on Systems Engineering and Steve Simske with Colorado State University presented on Measuring Stakeholder Alignment to Overcome Control System Vulnerability.
This webinar presented a discussion about existing disagreements among professionals having different roles involved in the cybersecurity operations of organizations due to variances in engineering practice, paradigms, processes, and culture for people in these roles. They discussed that understanding what can be done to improve effective collaboration among these professionals is a continuous science and engineering challenge with stakeholder disagreement resulting in measurable misalignment that leads to vulnerability.
_________________________________________________________________________________
Past Webinars
Past webinar presentation titles are found below.
- March 2023: Defense in Depth: How Election Officials Approach Voting Systems Security
- November 2022: Public- Private Collaboration to Enhance Operational Technology Cyber Defense
- August 2022: An Introduction to the New National Information Exchange Model (NIEM) Cyber Domain for Cyber Information Sharing
- June 2022: INCONTROLLER: Analysis and Implications of The New State-Sponsored Threat to ICS
- May 2022: Internet of Things and 5G: Exploring Cybersecurity Challenges in a More Connected World.
- February 2022: Internet of Things: Embedded Security Guidance
- October 2021: The End is Near...Now What? Best Practices for End of Services and End of Life
- June 2021: Supply Chain Risk Management in Operational Environments
- January 2021: Bow Tie Model of Destructive Malware
- October 2020: Robust Cyber Risk Management - Simplified
- March 2020: OT Needs 'Special Consideration' Which Means a Modified Approach to Security and True IT/OT Convergence to Achieve a Robust VM Program
- November 2019: Secure Operations Technology
- July 2019: Persistent Threat-Based Security for ICS Systems
- March 2019: Five Ways to Ensure the Integrity of Your Operations
- September 2018: The Top 20 Cyberattacks on Industrial Control Systems
- January 2018: Life After Ukraine: Industrial Control System Cybersecurity Industry Trends and Strategies
- October 2017: Creating Predictable Fail Safe Conditions for Healthcare Facility: Related Control Systems and Medical Devices by Use of System Segmentation
- July 2015: Protecting M2M Systems at the Edge
- October 2014: The New Paradigm for Information Security: Assumption of Breach
- June 2014: Online Real Time Monitoring for Change Identification
- March 2014: I Think, Therefore I Fuzz!