We deployed Indico v3.2. See our
blog post
for details on the changes.
Focus on:
All sessions
Plans & Implementations
Hide Contributions
Compact style
Indico style
Indico style - inline minutes
Indico style - numbered
Indico style - numbered + minutes
Indico Weeks View
Back to Conference View
Choose Timezone
Use the event/category timezone
Specify a timezone
Africa/Abidjan
Africa/Accra
Africa/Addis_Ababa
Africa/Algiers
Africa/Asmara
Africa/Bamako
Africa/Bangui
Africa/Banjul
Africa/Bissau
Africa/Blantyre
Africa/Brazzaville
Africa/Bujumbura
Africa/Cairo
Africa/Casablanca
Africa/Ceuta
Africa/Conakry
Africa/Dakar
Africa/Dar_es_Salaam
Africa/Djibouti
Africa/Douala
Africa/El_Aaiun
Africa/Freetown
Africa/Gaborone
Africa/Harare
Africa/Johannesburg
Africa/Juba
Africa/Kampala
Africa/Khartoum
Africa/Kigali
Africa/Kinshasa
Africa/Lagos
Africa/Libreville
Africa/Lome
Africa/Luanda
Africa/Lubumbashi
Africa/Lusaka
Africa/Malabo
Africa/Maputo
Africa/Maseru
Africa/Mbabane
Africa/Mogadishu
Africa/Monrovia
Africa/Nairobi
Africa/Ndjamena
Africa/Niamey
Africa/Nouakchott
Africa/Ouagadougou
Africa/Porto-Novo
Africa/Sao_Tome
Africa/Tripoli
Africa/Tunis
Africa/Windhoek
America/Adak
America/Anchorage
America/Anguilla
America/Antigua
America/Araguaina
America/Argentina/Buenos_Aires
America/Argentina/Catamarca
America/Argentina/Cordoba
America/Argentina/Jujuy
America/Argentina/La_Rioja
America/Argentina/Mendoza
America/Argentina/Rio_Gallegos
America/Argentina/Salta
America/Argentina/San_Juan
America/Argentina/San_Luis
America/Argentina/Tucuman
America/Argentina/Ushuaia
America/Aruba
America/Asuncion
America/Atikokan
America/Bahia
America/Bahia_Banderas
America/Barbados
America/Belem
America/Belize
America/Blanc-Sablon
America/Boa_Vista
America/Bogota
America/Boise
America/Cambridge_Bay
America/Campo_Grande
America/Cancun
America/Caracas
America/Cayenne
America/Cayman
America/Chicago
America/Chihuahua
America/Costa_Rica
America/Creston
America/Cuiaba
America/Curacao
America/Danmarkshavn
America/Dawson
America/Dawson_Creek
America/Denver
America/Detroit
America/Dominica
America/Edmonton
America/Eirunepe
America/El_Salvador
America/Fort_Nelson
America/Fortaleza
America/Glace_Bay
America/Goose_Bay
America/Grand_Turk
America/Grenada
America/Guadeloupe
America/Guatemala
America/Guayaquil
America/Guyana
America/Halifax
America/Havana
America/Hermosillo
America/Indiana/Indianapolis
America/Indiana/Knox
America/Indiana/Marengo
America/Indiana/Petersburg
America/Indiana/Tell_City
America/Indiana/Vevay
America/Indiana/Vincennes
America/Indiana/Winamac
America/Inuvik
America/Iqaluit
America/Jamaica
America/Juneau
America/Kentucky/Louisville
America/Kentucky/Monticello
America/Kralendijk
America/La_Paz
America/Lima
America/Los_Angeles
America/Lower_Princes
America/Maceio
America/Managua
America/Manaus
America/Marigot
America/Martinique
America/Matamoros
America/Mazatlan
America/Menominee
America/Merida
America/Metlakatla
America/Mexico_City
America/Miquelon
America/Moncton
America/Monterrey
America/Montevideo
America/Montserrat
America/Nassau
America/New_York
America/Nipigon
America/Nome
America/Noronha
America/North_Dakota/Beulah
America/North_Dakota/Center
America/North_Dakota/New_Salem
America/Nuuk
America/Ojinaga
America/Panama
America/Pangnirtung
America/Paramaribo
America/Phoenix
America/Port-au-Prince
America/Port_of_Spain
America/Porto_Velho
America/Puerto_Rico
America/Punta_Arenas
America/Rainy_River
America/Rankin_Inlet
America/Recife
America/Regina
America/Resolute
America/Rio_Branco
America/Santarem
America/Santiago
America/Santo_Domingo
America/Sao_Paulo
America/Scoresbysund
America/Sitka
America/St_Barthelemy
America/St_Johns
America/St_Kitts
America/St_Lucia
America/St_Thomas
America/St_Vincent
America/Swift_Current
America/Tegucigalpa
America/Thule
America/Thunder_Bay
America/Tijuana
America/Toronto
America/Tortola
America/Vancouver
America/Whitehorse
America/Winnipeg
America/Yakutat
America/Yellowknife
Antarctica/Casey
Antarctica/Davis
Antarctica/DumontDUrville
Antarctica/Macquarie
Antarctica/Mawson
Antarctica/McMurdo
Antarctica/Palmer
Antarctica/Rothera
Antarctica/Syowa
Antarctica/Troll
Antarctica/Vostok
Arctic/Longyearbyen
Asia/Aden
Asia/Almaty
Asia/Amman
Asia/Anadyr
Asia/Aqtau
Asia/Aqtobe
Asia/Ashgabat
Asia/Atyrau
Asia/Baghdad
Asia/Bahrain
Asia/Baku
Asia/Bangkok
Asia/Barnaul
Asia/Beirut
Asia/Bishkek
Asia/Brunei
Asia/Chita
Asia/Choibalsan
Asia/Colombo
Asia/Damascus
Asia/Dhaka
Asia/Dili
Asia/Dubai
Asia/Dushanbe
Asia/Famagusta
Asia/Gaza
Asia/Hebron
Asia/Ho_Chi_Minh
Asia/Hong_Kong
Asia/Hovd
Asia/Irkutsk
Asia/Jakarta
Asia/Jayapura
Asia/Jerusalem
Asia/Kabul
Asia/Kamchatka
Asia/Karachi
Asia/Kathmandu
Asia/Khandyga
Asia/Kolkata
Asia/Krasnoyarsk
Asia/Kuala_Lumpur
Asia/Kuching
Asia/Kuwait
Asia/Macau
Asia/Magadan
Asia/Makassar
Asia/Manila
Asia/Muscat
Asia/Nicosia
Asia/Novokuznetsk
Asia/Novosibirsk
Asia/Omsk
Asia/Oral
Asia/Phnom_Penh
Asia/Pontianak
Asia/Pyongyang
Asia/Qatar
Asia/Qostanay
Asia/Qyzylorda
Asia/Riyadh
Asia/Sakhalin
Asia/Samarkand
Asia/Seoul
Asia/Shanghai
Asia/Singapore
Asia/Srednekolymsk
Asia/Taipei
Asia/Tashkent
Asia/Tbilisi
Asia/Tehran
Asia/Thimphu
Asia/Tokyo
Asia/Tomsk
Asia/Ulaanbaatar
Asia/Urumqi
Asia/Ust-Nera
Asia/Vientiane
Asia/Vladivostok
Asia/Yakutsk
Asia/Yangon
Asia/Yekaterinburg
Asia/Yerevan
Atlantic/Azores
Atlantic/Bermuda
Atlantic/Canary
Atlantic/Cape_Verde
Atlantic/Faroe
Atlantic/Madeira
Atlantic/Reykjavik
Atlantic/South_Georgia
Atlantic/St_Helena
Atlantic/Stanley
Australia/Adelaide
Australia/Brisbane
Australia/Broken_Hill
Australia/Darwin
Australia/Eucla
Australia/Hobart
Australia/Lindeman
Australia/Lord_Howe
Australia/Melbourne
Australia/Perth
Australia/Sydney
Canada/Atlantic
Canada/Central
Canada/Eastern
Canada/Mountain
Canada/Newfoundland
Canada/Pacific
Europe/Amsterdam
Europe/Andorra
Europe/Astrakhan
Europe/Athens
Europe/Belgrade
Europe/Berlin
Europe/Bratislava
Europe/Brussels
Europe/Bucharest
Europe/Budapest
Europe/Busingen
Europe/Chisinau
Europe/Copenhagen
Europe/Dublin
Europe/Gibraltar
Europe/Guernsey
Europe/Helsinki
Europe/Isle_of_Man
Europe/Istanbul
Europe/Jersey
Europe/Kaliningrad
Europe/Kiev
Europe/Kirov
Europe/Lisbon
Europe/Ljubljana
Europe/London
Europe/Luxembourg
Europe/Madrid
Europe/Malta
Europe/Mariehamn
Europe/Minsk
Europe/Monaco
Europe/Moscow
Europe/Oslo
Europe/Paris
Europe/Podgorica
Europe/Prague
Europe/Riga
Europe/Rome
Europe/Samara
Europe/San_Marino
Europe/Sarajevo
Europe/Saratov
Europe/Simferopol
Europe/Skopje
Europe/Sofia
Europe/Stockholm
Europe/Tallinn
Europe/Tirane
Europe/Ulyanovsk
Europe/Uzhgorod
Europe/Vaduz
Europe/Vatican
Europe/Vienna
Europe/Vilnius
Europe/Volgograd
Europe/Warsaw
Europe/Zagreb
Europe/Zaporozhye
Europe/Zurich
GMT
Indian/Antananarivo
Indian/Chagos
Indian/Christmas
Indian/Cocos
Indian/Comoro
Indian/Kerguelen
Indian/Mahe
Indian/Maldives
Indian/Mauritius
Indian/Mayotte
Indian/Reunion
Pacific/Apia
Pacific/Auckland
Pacific/Bougainville
Pacific/Chatham
Pacific/Chuuk
Pacific/Easter
Pacific/Efate
Pacific/Fakaofo
Pacific/Fiji
Pacific/Funafuti
Pacific/Galapagos
Pacific/Gambier
Pacific/Guadalcanal
Pacific/Guam
Pacific/Honolulu
Pacific/Kanton
Pacific/Kiritimati
Pacific/Kosrae
Pacific/Kwajalein
Pacific/Majuro
Pacific/Marquesas
Pacific/Midway
Pacific/Nauru
Pacific/Niue
Pacific/Norfolk
Pacific/Noumea
Pacific/Pago_Pago
Pacific/Palau
Pacific/Pitcairn
Pacific/Pohnpei
Pacific/Port_Moresby
Pacific/Rarotonga
Pacific/Saipan
Pacific/Tahiti
Pacific/Tarawa
Pacific/Tongatapu
Pacific/Wake
Pacific/Wallis
US/Alaska
US/Arizona
US/Central
US/Eastern
US/Hawaii
US/Mountain
US/Pacific
UTC
Save
GMT
English (United States)
English (United Kingdom)
English (United States)
Español (España)
Français (France)
Polski (Polska)
Português (Brasil)
Türkçe (Türkiye)
Монгол (Монгол)
Українська (Україна)
中文 (中国)
Login
6th Control System Cyber-Security Workshop (CS)2/HEP
Sunday, October 8, 2017 -
9:00 AM
Monday, October 2, 2017
Tuesday, October 3, 2017
Wednesday, October 4, 2017
Thursday, October 5, 2017
Friday, October 6, 2017
Saturday, October 7, 2017
Sunday, October 8, 2017
9:00 AM
Intro to the 6th CS2HEP: Why Control System Cyber-Security Sucks...
-
Stefan Lueders
(CERN)
Intro to the 6th CS2HEP: Why Control System Cyber-Security Sucks...
Stefan Lueders
(CERN)
9:00 AM - 9:20 AM
9:20 AM
The Trickle Down Effect: Protecting SCADA systems at the high energy physics lab, SLAC, by minimizing human error through phishing training policy and best practices
-
Ashley Tolbert
(SLAC/Stanford University)
The Trickle Down Effect: Protecting SCADA systems at the high energy physics lab, SLAC, by minimizing human error through phishing training policy and best practices
Ashley Tolbert
(SLAC/Stanford University)
9:20 AM - 9:45 AM
The Trickle Down Effect: Protecting SCADA systems at the high energy physics lab, SLAC, by minimizing human error through phishing training policy and best practices Preventing another Stuxnet-like attack means first leveraging training to familiarize staff with what common attacks look like. Stanford’s high energy physics lab, SLAC, recently roll out a simulation phishing exercise and security policy to test and improve real-time responses to phishing emails, familiarize employees with phishing emails, and to raise awareness on the growing impact of phishing. Training was administered through an email that imitates a phishing email. In this presentation and paper, we discuss the important link of phishing training and security training policy to protecting industrial systems in an academic environment that requires flexibility for scientific innovation, the role of the ever-growing Internet of Things (IoT) in securing systems at scientific/government labs, how we notified our user community, how we gained management buy-in, and some of the tips and learnings we discovered along the way to run an interactive, engaging, successful, well-received campaign.
9:45 AM
Control system network security issues and recommendations
-
Stephen Page
(CERN)
Control system network security issues and recommendations
Stephen Page
(CERN)
9:45 AM - 10:10 AM
Accelerator control system networks host computing devices and infrastructure vital to the achievement of a research lab's mission. This presentation will outline common issues affecting the computer security of those networks and describe techniques and recommendations which may be applied to allow access to those resources to be regulated, while remaining compatible with working methods within a control system environment.
10:10 AM
Control-system cyber-security operational practices at SOLEIL
-
Alain Buteau
(Soleil)
Control-system cyber-security operational practices at SOLEIL
Alain Buteau
(Soleil)
10:10 AM - 10:35 AM
SOLEIL is a synchrotron facility near Paris, France, opened since 2006. SOLEIL covers fundamental research needs in physics, chemistry, material sciences, life sciences, earth sciences, and atmospheric sciences. 29 beamlines are currently open to users, with approximately 6300 hours of beamtime and 2500 users per year. Accelerators and beamlines equipment are controlled using the Tango distributed Object Oriented framework The talk will present SOLEIL IT teams operational practices to manage cyber security on its Control Systems. In particular the following items will be addressed during the talk: • Security policies and organisational rules • Control Systems Overview • TCP/IP networks topologies and firewalling rules • Expert connections to the control systems for daily operation • End users access and authentication rules and practices • Connection of PCs and network controlled objects to control systems • Software development cycle and system configuration management Being conscious that Cybersecurity is (and will be) a major concern in the future, we will also present our short term actions to enhance the present situation , trying to keep a good balance between security and operational needs.
10:35 AM
Coffee Break
Coffee Break
10:35 AM - 11:00 AM
11:00 AM
Accelerator network safety at PSI
-
Dirk Zimoch
(Paul Scherrer Institut)
Accelerator network safety at PSI
Dirk Zimoch
(Paul Scherrer Institut)
11:00 AM - 11:20 AM
This presentation shows how we protect accelerator networks from unauthorized access and how we pass data to the outside world.
11:20 AM
Security measures for ESS PSS software development
-
Denis Paulic
(ESS)
Security measures for ESS PSS software development
Denis Paulic
(ESS)
11:20 AM - 11:45 AM
The main purpose of Personnel Safety Systems (PSS) at ESS is to protect workers from the facility’s ionising radiation hazards. Since only proven-in-use COTS components are used in implementing PSS’ safety functions, the software will be developed in accordance with IEC 61511, whilst the system development life-cycle follows a general functional safety standard; IEC 61508. Normal risk assessment processes recommended in these standards are not sufficient to address security threats to PLC-based safety systems. Therefore, some additional measures and solutions are required to improve the system’s security, but these need to be applied in the correct way not to compromise system’s safety. PSS software configuration management ensures that appropriate methods are implemented for traceability of software elements (including their use, change/modification and destruction) and separate risk assessment based on IEC 62443 standard is being carried out for addressing the information security. This risk assessment will provide additional software requirements (including the software architecture and interfaces with other systems), which shall be implemented as security measures and tested regularly. This session/presentation will cover some of these measures.
11:45 AM
Rethinking Institution Security Approach
-
Sergi Blanch-Torné
Sergio Vicente Molina
Rethinking Institution Security Approach
Sergi Blanch-Torné
Sergio Vicente Molina
11:45 AM - 12:10 PM
Usually in organizations there is often a CISO who is in charge of the IT security of the company. CISOs are not a member of any particular section of the company. IT security in practice can be seen from different points of view depending on the people involved in a specific project. Even in security by default, section interests may collide. In ALBA there is an inter-section group called IT Security Coordination group that tries to gather all the different aspects of the security from the different sections of the Computing Division and to propose the measures to be deployed.
12:10 PM
Internet of Things on Accelerator Control Networks
-
Pascal Oser
(Hochschule Karlsruhe, Technik und Wirtschaft (DE))
Internet of Things on Accelerator Control Networks
Pascal Oser
(Hochschule Karlsruhe, Technik und Wirtschaft (DE))
12:10 PM - 12:35 PM
The European Organization for Particle Physics (CERN) faces today dif- ferent types of hardware that gets integrated into the accelerator complex. While integrating Internet of Things (IoT) devices in mission-critical net- works with industrial control systems, it puts their directly controlled assets at risk and possibly endanger the whole connected facility. IoT devices introduce vulnerabilities, either by malicious intention or by wrong configuration. For this reason, we scan for IoT devices on CERN networks on a regular base. We detected unprotected ports for changing the configuration for printers or thermometers and several web-cams of the same model that are prone to remote code execution. Attackers can use remote code execution to gain access to the internal network from the outside and dig further while operating on a trustworthy device. Based on these findings, we suggest to run regular scans on any network to detect IoT devices and check their configurations properly.
12:35 PM
Dealing with insecure and/or cyber espionage enabled COTS devices
-
Kevin Brown
(BNL)
Dealing with insecure and/or cyber espionage enabled COTS devices
Kevin Brown
(BNL)
12:35 PM - 1:00 PM
Manufacturers and companies distributing COTS devices don’t necessarily give cyber security a high priority, or for small outfits, may not have the expertise to make sure their devices are ‘cyber safe’. As more and more controls devices now come with Ethernet interfaces and many come with some sort of embedded operating system, making sure these devices are ‘safe’ to connect to our networks is becoming a more and more overwhelming task. In this round table discussion, we will share our experiences with COTS devices that were either found to contain malware, act as malware portals (attempt to connect to some sever), or are suspected to be portals for cyber espionage. We will share methods we use to cope with such devices and brainstorm on possible ways to improve our security around them.
1:00 PM
Lunch Break
Lunch Break
1:00 PM - 2:00 PM
2:00 PM
Access Security of RHIC Control System
-
Andrei Sukhanov
(BNL)
Access Security of RHIC Control System
Andrei Sukhanov
(BNL)
2:00 PM - 2:30 PM
RHIC Control System is based on the Accelerator Device Object (ADO) model, and it uses RPC protocol over TCP/IP transport level. The access to any device is managed by corresponding ADO Manager, a C++ or Python program, running on a workstation or a front-end controller. All wired networking equipment is isolated from the rest of the lab behind the strictly maintained department firewall. Each new device, before being wired to the network, passes rigorous certification process. The device access policy is based mainly on access monitoring rather than on the access control. Most of the released client applications provided with a 'Set History' feature, which logs the setting of each ADO parameter into a central database, the user logins are also tracked. The 'Set History' monitoring is attached to the central alarm monitor. In addition, some of the equipment is protected with software locks, based on a file access properties. The 'Set History' monitoring was very useful in investigation of very complex machine failures. To further improve the access security we began to implement additional features like password protection and lockout-tagout.
2:30 PM
Secrets management in a control system environment using Vault
-
Anton Joubert.
(National Research Foundation (South Africa))
Secrets management in a control system environment using Vault
Anton Joubert.
(National Research Foundation (South Africa))
2:30 PM - 3:00 PM
Scientific control systems are generally deployed in trusted network environments with passwords, SSH keys, database connection strings, account keys, encryption keys and other secrets stored in a variety of locations such as source code, configuration management systems, and company wikis. Due to the “trust” they are often distributed via insecure methods of communication such as email, instant messaging and word of mouth. Managing secrets is an essential component of a control system with a wide impact. Including: detection of and response to security breaches; enforcement of security policies; management of infrastructure security; granting third party access; and even the effort required to open source a software package. This talk will briefly discuss some of the issues we have come across as we continue to develop the control system for the MeerKAT radio telescope, a precursor to the Square Kilometre Array project. The main focus is an overview of the tool recently selected to manage our secrets: HashiCorp Vault. We are still learning.
3:00 PM
1000 things you always want to know about SSO but you never dared to ask!
-
Luis Rodriguez Fernandez
(CERN)
1000 things you always want to know about SSO but you never dared to ask!
Luis Rodriguez Fernandez
(CERN)
3:00 PM - 3:30 PM
How many times you were in a meeting with a sales person and you start to sweat when you hear "yes the system will be fully integrated with your SSO"? How many times have you searched on internet for "SSO" and you closed your browser after the second click? SAML, OAUth, ws-fed... which of these is the right protocol? Shibboleth, OpenAM, ADFS2, CAS... do I need all of them? Do I need them at all? Which is the right solution to my application? How to protect my APIs? This session wants to cover the most popular SSO scenarios and it will guide you in the sometimes obscure path to the "login once and access all" grail.
3:30 PM
Coffee Break
Coffee Break
3:30 PM - 4:00 PM
4:00 PM
Discussion on AuthN & AuthZ
-
Karen White
(ORNL)
Discussion on AuthN & AuthZ
Karen White
(ORNL)
4:00 PM - 4:45 PM
4:45 PM
General Discussion
-
Stefan Lueders
(CERN)
General Discussion
Stefan Lueders
(CERN)
4:45 PM - 5:30 PM
Potential topics: * Dealing contractors and sub-contractors (maintenance operations, use of portable devices...) * USB devices (used for PLCs and system upgrade)... Any specific test protocol before using inside the ICS ? * Wireless connected plants, wireless communications, device monitoring using wireless systems and security protocols * How to apply security rules? * Information security management systems, ISO27001 standards, and risk assessment