DEF CON 29
SCHEDULE
August 6th: 10:00 am - 4:00 pm PDT
August 7th: 10:00 am - 3:30 pm PDT
August 8th: 10:00 am - 3:00 pm PDT
ICS Village will be 100% virtual at DEF CON 29. Talks will be released on our YouTube channel at the scheduled times below, but don’t worry if you can’t catch them—they’ll be available on YouTube indefinitely.
Still, you’ll want to try and catch them live if you can, because we’ll also be hosting real-time Q&A sessions with speakers on our Discord channel at the same time as the talks (again, following the schedule below). No registration is required—just pop in whenever you want.
Our Discord channel is on the DEF CON Discord server, which you can join join here. Once you’ve joined, navigate to the #roles channel, react with the house emoji to view channels for villages, and then join the ICS Village channel (on the left sidebar). (If you are reading this before DEFCON 29, be aware that some of this functionality may not be set up yet!)
ICS Village will also feature several workshops and CTFs! Be sure to give them a shot:
We’re featuring two CTFs, which will run from 10:00 a.m. PDT on Friday, Aug. 6 to 4:00 p.m. PDT on Sunday, Aug. 8:
- Hack the Planet: Help us protect our Unicorn Cupcake process line by performing a PLC security assessment!
- CISA ICS CTF: Try your hand at this CTF run by CISA (and tweet about it with #CISAICSCTF if you’re on social media)
We’re also featuring several workshops:
GRIMM and Insane Forensics will be running three one-hour tabletop exercises on Friday, Aug. 6. Spots are limited, so please pre-register at the links below:
- Session 1 (10:00 a.m. – 11:00 a.m. PDT)
- Session 2 (12:00 p.m. – 1:00 p.m. PDT)
- Session 3 (3:00 p.m. – 4:00 p.m. PDT)
CybatiWorks will also be featuring a Mission Station Workshop on Saturday, Aug. 7 from 10:00 a.m. – 12:00 p.m. PDT.
ICS Village Talk Schedule
All Times Local (PDT)
Tabletop Exercise - GRIMM and Insane Forensics
Living off the Land in an ICS/OT Penetration Test
Your Infrastructure is Encrypted: Protecting Critical Infrastructure from Ransomware
Jamil Jaffer, Ernie Bio, David Etue, Jennifer DeTrani
Do We Really Want to Live in the Cyberpunk World?
Tabletop Exercise - GRIMM and Insane Forensics
Beetlejuice: The Lessons We Should Have Learned For ICS Cybersecurity
Scripts and Tools to Help Your ICS InfoSec Journey
Consider the (Data) Source
Approaches to Attract, Develop, and Retain an Industrial Cybersecurity Workforce
John Ellis, Julia Atkinson
Tabletop Exercise - GRIMM and Insane Forensics
It Takes a Village (and a generous grant): Students Performing ICS Security Assessments
Dennis Skarr, Christopher Von Reybyton, Alexander Vigovskiy
CybatiWorks Powered by IntelliGenesis Mission Station Workshop
Network Traffic Analysis with Malcolm
Highlighting the Importance of Detection Context using the ATT&CK Evaluations for ICS Results
Fireside Chat - August Cole
Toward a Collaborative Cyber Defense and Enhanced Threat Intelligence Structure
Fortifying ICS - Hardening and Testing
Crippling the Grid: Examination of Dependencies and Cyber Vulnerabilities
Leveraging SBOMs to Enhance ICS Security
Smart Meters: I'm Hacking Infrastructure and So Should You
Bottom-Up and Top-Down: Exploiting Vulnerabilities In the OT Cloud Era
Sharon Brizinov, Uri Katz
Detecting Attackers Using Your Own Sensors with State Estimation
Top 20 Secure PLC Coding Practices
Vivek Ponnada, Sarah Fluchs
ICS Cyber Threat Intelligence (CTI) Information Sharing Between Brazil and the United States
Paul de Souza, Helio Sant'ana, Max Campos, Tom VanNorman, John Felker
ICS Intrusion KillChain explained with real simulation
Javier Perez, Juan Escobar
Building an ICS Firing Range (in our kitchen): Sharing Our Journey & Lessons Learned (so you don’t have to)
Nico Leidecker, Moritz Thomas
Mary Brooks, Maggie Morganti, Tatyana Bolton, Chris Sistrunk