BEGIN:VCALENDAR
PRODID:-//vBulletin 6//EN
VERSION:2.0
CALSCALE:GREGORIAN
BEGIN:VEVENT
UID:c4b27e3f-5a01-4920-9099-995590c45c1c
DTSTAMP:20260428T151404Z
SUMMARY:ICS Forensics tool - Maayan Shaul &amp\; Ori Perez
DESCRIPTION:ICS Forensics tool\n\nSaturday August 12\, 14:00 – 15:55\, So
 ciety Boardroom\, Forum\n\nMaayan Shaul & Ori Perez\n\nMicrosoft ICS Foren
 sics Tools is an open source forensic toolkit for analyzing Industrial PLC
  metadata and project files. Microsoft ICS Forensics Tools enables investi
 gators to identify suspicious artifacts on ICS environment for detection o
 f compromised devices during incident response or manual check. Microsoft 
 ICS Forensics Tools is open source\, which allows investigators to verify 
 the actions of the tool or customize it to specific needs\, currently supp
 ort Siemens S7 via Snap7.\n\nMaayan Shaul is a Malware Analyst and Securit
 y Researcher in Section52 at Microsoft Defender for IoT (formerly CyberX).
  Experienced in the fields of malware analysis\, reverse engineering and t
 he IoT/OT landscape.\n\nOri Perez is a Malware Analyst and Reverse Enginee
 r with vast experience in dealing with Nation-sponsored cyber attacks as a
 n ex-officer at the IDF's CERT. Ori is manager at Microsoft Defender for I
 oT research team (formerly CyberX) and research IoT/OT protocol research f
 or IoT/OT tools .\n\nAudience - Defense\, forensics folks\, ICS/OT enthusi
 astic​
URL:https://forum.defcon.org/node/246355
DTSTART:20230812T220000Z
DTEND:20230812T235501Z
LOCATION:Society Boardroom\, Forum
END:VEVENT
END:VCALENDAR
