ResearchSOC 2020 Webinar Series #2 - Feb 20 - How to Secure ICS/SCADA Systems: Strategies that Work!

Securing ICS/SCADA Systems: Strategies that Work!

ResearchSOC 2020 Webinar #2 - February 20th, 3:00pm EST

Telescopes. Monitoring systems. Scientific instruments. Centrifuges. Control systems. SCADA and ICS systems are large, complex, essential, expensive, and too often running highly specialized software, outdated and vulnerable software, or both. Join ResearchSOC’s special guests, Dr. Stefan Lueders, and Phil Salkie as they bring their unique perspectives to the challenge of securing these systems and learn proven strategies for improving the security of these types of systems.

Our Presenters:

Stefan Luders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined the European Organization for Particle Physics (CERN) in 2002. Since 2009, he has headed the CERN Computer Security Incident Response Team as CERN’s Computer Security Officer with the mandate to coordinate all aspects of CERN’s computer security – office computing security, computer centre security, GRID computing security and control system security – whilst taking into account CERN’s operational needs.

Dr. Lüders has presented on computer security and control system cyber-security topics at many different occasions to international bodies, governments, and companies, and published several articles.


Phil Salkie is a computer scientist with over 35 years experience with Programmable Controls, Industrial Automation and Embedded Systems. He has presented ICS Security training sessions at the NSF Cybersecurity Summit for NSF Large Facilities and other Cyberinfrastructure conferences since 2015, and was the keynote speaker at the CACR cybersecurity summit in 2017.

Phil’s software and hardware designs are serving sectors as diverse as food packaging, sewage processing, broadcast television, emergency power generation, lab and medical equipment and nuclear power plant infrastructure. He is a managing partner of Jenariah Industrial Automation since its founding in 2014.

Registration Information

Registration is open on this page.

You can learn about our next upcoming webinars on our webinar page. Our March topic will be How to Select and Use Operational Cybersecurity Metrics to Make Cybersecurity Operations More Effective by Susan Sons.

Next week will return to discussing Identity Management issues with a discussion of the Best Practices for securing your SSH and X509 certificates.