Welcome to the Interactive Agenda for the 2016 ICS Cyber Security Conference! (View the full ICS Cyber Security Conference website here)  This agenda is currently a work in progress, please check back often as our team is making upates DAILY. (You can register for the conference here)
Back To Schedule
Monday, October 24 • 8:00am - 5:00pm
Automation Exploitation [8AM-5PM]

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Learn how attackers reverse engineer, compromise, and backdoor, control systems.

Brought to you by the Senrio research team (formerly Xipiter) whose custom developed trainings have sold out at Blackhat five years running, this intense hands-on Automation Exploitation workshop is meant to provide an introductory basis to the unique security challenges in the world of Automation.

Participants will learn how attackers reverse engineer, tamper with,and exploit all parts of an industrial control network. Since Automotive technologies have their roots in Industrial Control and Building Automation (CAN bus) this course will also include "Car Hacking" content. Participants will learn about threats to those systems, perform hand-on attacks themselves, and learn how these insecure design patterns are found throughout the world of Automation (and automotives!).

Who Should Attend:

  • Field Service Engineers, Safety Engineers, Automation Engineers,"Makers", Tinkerers, Developers, IT Professionals, Mobile Developers, Hackers, Penetration Testers, Forensic Investigators, reverse engineers, software security auditors/analysts, software exploitation engineers, jail breakers, and anyone interested.

Student Requirements:

  • Understanding basic computing.
  • Some programming experience a plus.
What to Bring:


  • A laptop (running their favorite OS) capable of connecting to wired and wireless networks. Laptop must also have several available and operational USB Ports
  • Installed and valid VMWare workstation (with working access to USB Ports and network card bridged or NATed)
  • Three button external mouse.

avatar for Stephen A. Ridley

Stephen A. Ridley

Founder and CEO/CTO, Senrio
Stephen A. Ridley is Founder and CEO/CTO at Senrio. He has more than 10 years of experience in software development, software security, and reverse engineering. His original research on embedded device vulnerabilities has been featured on SecurityWeek, NPR, Wired and numerous other... Read More →

Monday October 24, 2016 8:00am - 5:00pm EDT
Workshop 4 (Salon 5)