Ken Munro will be presenting: Hacking Wind Turbines and other Industrial Control System Cyber Attacks Identifying wind turbine components and telemetry systems that can be remotely accessed What can and does go wrong in cyber -attacks against ICS What lessons can be learned from other forms of power generation
Ken Munro will be presenting: Tesla Teardown. Security issues in hardware and firmware update mechanisms Tesla has long been seen as a trailblazer in its design and is respected for its security. But issues can still occur. It’s Achilles heel is perhaps its remote update mechanism, which, if exploited could allow an attacker to execute code, […]
Ken Munro will be presenting: Hacking Heavy Plant and other ICS / OT Cyber Attacks With crossovers in technology including IIoT & OT, ICS has never looked more different See what can and does go wrong in cyber-attacks against ICS Learn from the cyber mistakes made in IoT over the last 5 years
Join this virtual roundtable of cybersecurity experts with experience researching and testing the cyber resilience of connected aircraft systems. The cyber resiliency of connected aircraft systems remains an essential topic of discussion across multiple segments of the aviation industry. In October 2020, a new report published by the U.S. Government Accountability Office (GAO) called for […]
Information Security Summit - Challenge of Securing the New Norm: the Remote, Mobile, Decentralised and Virtual Business Ken Munro will be talking about IoT security: Details TBC
Welcome to the Security Un-Happy Hour where we bring together a group of security professionals, and naturally cheerful folks, to discuss topics in the cyber security community, share knowledge, learn, teach and exchange ideas. Ken Munro will be joining. Details and URL TBC.