CYRA: Building Resilience & Trust in Supply Chains

In this session we explain the method of cyber rating – CYRA in short. CYRA has started with an IT module (based on ISO-27001) and the OT module (based on IEC-62443) has been added recently. In this session, we present CYRA – a cyber rating methodology designed to significantly improve digital resilience across critical supply […]

Dead Man’s PLC: Ransoming the Physical World via OT

Cybercrime is currently the most pervasive threat to organisations who use operational technology (OT), but it isn’t the most significant threat to OT itself. That’s because cybercrime models like ransomware and double extortion are aimed at IT and simply don’t translate well to OT. However, as cybercriminals diversify and specifically target OT, the development of […]

10 Years of Hardware Hacking: Secret Insights & Lessons

This session offers a rare opportunity to gain exclusive insights into hardware hacking, drawn from 10 years of practical experience. Designed for a diverse audience, including non-technical attendees, the presentation combines unconventional techniques, challenges, and lessons learned without disclosing sensitive details. Strict confidentiality applies (TLP: Amber). No recordings allowed.

Admin Interfaces Under Siege: Strategies to Fight Back!

“Compromising privileged systems remains a core focus of advanced cyber actors. How can we step up our defences to meet the growing threat and reduce the impact of common attacks? Join NCSC UK for a deep dive into the new Privileged Access Workstation (PAW) guidance. This guidance will help you implement and operate solutions to […]

10 Years of Hardware Hacking: Secret Insights & Lessons

“This session offers a rare opportunity to gain exclusive insights into hardware hacking, drawn from 10 years of practical experience. Designed for a diverse audience, including non-technical attendees, the presentation combines unconventional techniques, challenges, and lessons learned without disclosing sensitive details.Strict confidentiality applies (TLP: Amber). No recordings allowed.”