9th Control System Cyber-Security Workshop (CS)2/HEP
Sunday 21 September 2025 -
09:00
Monday 15 September 2025
Tuesday 16 September 2025
Wednesday 17 September 2025
Thursday 18 September 2025
Friday 19 September 2025
Saturday 20 September 2025
Sunday 21 September 2025
09:00
Intro into the 9th CS2/HEP
-
Stefan Lueders
(
CERN
)
Intro into the 9th CS2/HEP
Stefan Lueders
(
CERN
)
09:00 - 09:15
09:15
Control Systems, Cyber Security and Conflicting Priorities
-
Karen White
(
Oak Ridge National Laboratory
)
Control Systems, Cyber Security and Conflicting Priorities
Karen White
(
Oak Ridge National Laboratory
)
09:15 - 09:45
Control systems for scientific user facilities and cybersecurity initiatives share important goals but do not always share common paths and priorities. This talk will explore priority drivers, conflicts and compromises.
09:45
A Wish or Hope for better OT cybersecurity
-
Timothy Zingelman
Chandler Lawrence
(
Fermilab
)
A Wish or Hope for better OT cybersecurity
Timothy Zingelman
Chandler Lawrence
(
Fermilab
)
09:45 - 10:15
We have implemented a commercial security appliance which processes a full network feed from our control system to passively identify threats and anomalies. We will discuss the successes and failures so far using this tool
10:15
Morning Coffee
Morning Coffee
10:15 - 10:45
10:45
The Extremely Large Telescope (ELT) Primary Mirror Control System
-
Luigi Andolfato
The Extremely Large Telescope (ELT) Primary Mirror Control System
Luigi Andolfato
10:45 - 11:15
The Control System of the Extremely Large Telescope (ELT) Primary Mirror will be presented in terms of network layout, control system stack, possibility for remote access and data transfer, SW development and maintainability processes, interaction with other systems and the Internet.
11:15
18 months into the CERN cyber-security audit
-
Stefan Lueders
(
CERN
)
18 months into the CERN cyber-security audit
Stefan Lueders
(
CERN
)
11:15 - 12:15
With thorough 2023 cyber-security audit at CERN, the IT department and the CERN Computer Security Office as well as the Organization as a whole has been tasked with 95 different work packages to improve their computer security posture. This presentation will go to their implementation and deployment, the successes and the areas creating additional problems
12:15
Lunch
Lunch
12:15 - 14:00
14:00
Lessons Learned from the HZB security incident
-
Thomas Birke
Lessons Learned from the HZB security incident
Thomas Birke
14:00 - 15:00
A ransomware attack disrupted HZB and BESSY II operations, prompting a complete network infrastructure rebuild. The recovery task force utilized standardized Ansible playbooks for rapid deployment, resulting in a modernized science data acquisition network with improved configurations managed through version-controlled GitLab repositories for enhanced tracking and maintenance.
15:00
Cyber Secure Experimental Physics and Industrial Control System
-
George McIntyre
(
SLAC National Accelerator Laboratory
)
Cyber Secure Experimental Physics and Industrial Control System
George McIntyre
(
SLAC National Accelerator Laboratory
)
15:00 - 15:30
Secure PVAccess (SPVA) brings production-grade cybersecurity to the Experimental Physics and Industrial Control System (EPICS) framework by encapsulating the PVAccess protocol within Transport Layer Security (TLS). It integrates X.509 certificate-based authentication with common laboratory-wide services such as Kerberos and LDAP, and delivers a full certificate authority, management, and distribution solution. Leveraging this robust authentication layer, Secure PVAccess extends the existing EPICS Security model to enforce true Process Variable (PV) access control based on verified peer identities, attributes, and connection modes. We describe the overall architecture, key design decisions, software components, current status, envisioned future capabilities, and the collaborative effort driving this initiative.
15:30
Afternoon Tea
Afternoon Tea
15:30 - 16:00
16:00
(Too?) Many of ways into CERN
-
Stefan Lueders
(
CERN
)
(Too?) Many of ways into CERN
Stefan Lueders
(
CERN
)
16:00 - 16:30
Remote access to labs for users and experts, in particular, control systems, is essential for the efficient running of control systems of accelerators and experiments. However, such an Internet-connectivity exposes sensitive and poorly protection systems to the risks of direct attacks. This presentation shall discuss the remote access model into the CERN Campus network as well as into its technical infrastructure.
16:30
Discussions
-
Stefan Lueders
(
CERN
)
Discussions
Stefan Lueders
(
CERN
)
16:30 - 17:00
* What are your general policies for controls? Have you been audited? What are lessons learnt and best practises? * How do you allow remote monitoring / control? * How did you design your control network and interact with your data centre(s) and campus networks? * How to you address cloud usage like OracleDB, Git, but also ML/AI/LLM? * What about remote software development and CI/CD pipelines? Do you run SBOM? Some other verifications? * How to secure IoT and SoC ("system on a chip") components? * What about "zero-trust" in an OT environment? * [Anything you want to know/talk about/discuss/have input on/wonder] * [Your favorite security subject HERE]