BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
DTSTART:20230312T030000
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:PDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20231105T010000
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:PST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20230921T225426Z
UID:B47567D3-1564-4D53-B6BF-299D32F97837
DTSTART;TZID=America/Los_Angeles:20230613T190000
DTEND;TZID=America/Los_Angeles:20230613T210000
DESCRIPTION:This event will be available live at SEMI\, as well as over Zoo
 m. Get to SEMI by 6:30pm to network – and enjoy great pizza and refreshm
 ents!\n\nSome of the most common cybersecurity threats to Industrial Contr
 ol Systems (ICS) include: malware\, ransomware\, phishing\, distributed de
 nial of service attacks\, and physical attacks. ICS controls and monitors 
 industrial processes in a wide range of industries\, including energy\, ma
 nufacturing\, transportation\, and water/wastewater. Examples include prog
 rammable logic controllers and Supervisory Control and Data Acquisition (S
 CADA) systems. As ICS is often connected to the Internet\, it is vulnerabl
 e to cyberattacks.\n\n[Dragos Security](https://www.dragos.com/)\, a cyber
 security firm that specializes in securing ICS systems\, issued a recent r
 eport noting that there were over 500 ransomware attacks on industrial sys
 tems in the United States in 2022. In 2021\, a ransomware attack on a wate
 r treatment plant in Florida caused the plant to temporarily shut down\, l
 eaving residents without water for several hours. The Stuxnet attack on ur
 anium enrichment equipment in Iran is probably the most well-known direct 
 attack on ICS. [CrashOveride malware](https://www.cisa.gov/news-events/ale
 rts/2017/06/12/crashoverride-malware) was reportedly used in 2016 against 
 critical infrastructure in Ukraine.\n\nThe U.S. Department of Homeland Sec
 urity’s [Critical Infrastructure Security Agency (CISA)](https://www.cis
 a.gov/) leads the national effort to understand\, manage\, and reduce risk
  to the cyber and physical infrastructure on which Americans depend on a d
 aily basis. Among the 16 critical infrastructure sectors are Communication
 s\, Energy\, Food and Agriculture\, Financial Services\, and Healthcare an
 d Public Health.\n\nIn this talk\, Mario Garcia will discuss current trend
 s in cybersecurity threats\, and how CISA works to reduce risk and improve
  the resilience of the nation’s critical infrastructure. CNSV member [Da
 vid Snyder](https://californiaconsultants.org/members/david-m-snyder/) wil
 l present additional details on Industrial Control Systems cybersecurity.\
 n\nSpeaker(s): Mario Garcia\, David Snyder\n\n567 Yosemite Dr\, Milpitas\,
  California\, United States\, 95035\, Virtual: https://events.vtools.ieee.
 org/m/362944
LOCATION:567 Yosemite Dr\, Milpitas\, California\, United States\, 95035\, 
 Virtual: https://events.vtools.ieee.org/m/362944
ORGANIZER:david@42tek.com
SEQUENCE:16
SUMMARY:Cybersecurity for Industrial Control Systems
URL;VALUE=URI:https://events.vtools.ieee.org/m/362944
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;&lt;strong&gt;This event will be available live 
 at SEMI\, as well as over Zoom. Get to SEMI by 6:30pm to network &amp;ndash\; 
 and enjoy great pizza and refreshments!&lt;/strong&gt;&lt;/p&gt;\n&lt;p&gt;Some of the most 
 common cybersecurity threats to Industrial Control Systems (ICS) include: 
 malware\, ransomware\, phishing\, distributed denial of service attacks\, 
 and physical attacks. ICS controls and monitors industrial processes in a 
 wide range of industries\, including energy\, manufacturing\, transportati
 on\, and water/wastewater. Examples include programmable logic controllers
  and Supervisory Control and Data Acquisition (SCADA) systems. As ICS is o
 ften connected to the Internet\, it is vulnerable to cyberattacks.&lt;/p&gt;\n&lt;p
 &gt;&lt;a href=&quot;https://www.dragos.com/&quot; target=&quot;_blank&quot; rel=&quot;noopener nofollow&quot;
 &gt;Dragos Security&lt;/a&gt;\, a cybersecurity firm that specializes in securing I
 CS systems\, issued a recent report noting that there were over 500 ransom
 ware attacks on industrial systems in the United States in 2022. In 2021\,
  a ransomware attack on a water treatment plant in Florida caused the plan
 t to temporarily shut down\, leaving residents without water for several h
 ours. The Stuxnet attack on uranium enrichment equipment in Iran is probab
 ly the most well-known direct attack on ICS. &lt;a href=&quot;https://www.cisa.gov
 /news-events/alerts/2017/06/12/crashoverride-malware&quot; target=&quot;_blank&quot; rel=
 &quot;noopener nofollow&quot;&gt;CrashOveride malware&lt;/a&gt; was reportedly used in 2016 a
 gainst critical infrastructure in Ukraine.&lt;/p&gt;\n&lt;p&gt;The U.S. Department of 
 Homeland Security&amp;rsquo\;s &lt;a href=&quot;https://www.cisa.gov/&quot; target=&quot;_blank&quot;
  rel=&quot;noopener nofollow&quot;&gt;Critical Infrastructure Security Agency (CISA)&lt;/a
 &gt; leads the national effort to understand\, manage\, and reduce risk to th
 e cyber and physical infrastructure on which Americans depend on a daily b
 asis. Among the 16 critical infrastructure sectors are Communications\, En
 ergy\, Food and Agriculture\, Financial Services\, and Healthcare and Publ
 ic Health.&lt;/p&gt;\n&lt;p&gt;In this talk\, Mario Garcia will discuss current trends
  in cybersecurity threats\, and how CISA works to reduce risk and improve 
 the resilience of the nation&amp;rsquo\;s critical infrastructure. CNSV member
  &lt;a href=&quot;https://californiaconsultants.org/members/david-m-snyder/&quot; targe
 t=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;David Snyder&lt;/a&gt; will present additional details
  on Industrial Control Systems cybersecurity.&lt;/p&gt;
END:VEVENT
END:VCALENDAR

