David Atch is an ICS cybersecurity expert with extensive experience in malware analysis, threat hunting and incident response. In February 2016, he uncovered Operation BugDrop, a large-scale cyberespionage campaign targeting Ukrainian critical infrastructure. He also led the team that reverse-engineered BlackEnergy3 and discovered it was designed to perform data exfiltration from OT networks, as well as uncovering that KillDisk malware had evolved into ransomware. Atch has also discovered numerous zero-days in widely used industrial devices which were reported by ICS-CERT. Prior to CyberX, Atch had a military career in the IDF where he led their elite team of incident responders who continuously hunted and mitigated cyber-intrusions targeting the country’s critical national infrastructure.