Man-in-the-SCADA: Anatomy of Data Integrity Attacks in Industrial Control Systems |
Black Hat Asia 2017
|
What's the DFIRence for ICS? |
Black Hat USA 2016
|
How to Get into ICS Security |
RSAC USA 2016
|
NSM 101 for ICS |
DEF CON 23
|
DEF CON Comedy Inception: How many levels deep can we go? |
DEF CON 23
|