Event Agenda

October 21st – 22nd, 2026 // Chicago, Illinois

Register Now

Event Agenda

October 21st – 22nd, 2026 // Chicago, Illinois

Register Now

We are currently working on the 2026 agenda and will be updating it soon.
In the meantime, take a look at the topics and themes discussed as part of the 2025 agenda:

Theme: Progress over Perfection: Navigating the Cybersecurity Imperative While Staying Competitive

Day 2 // October 15th 2025
08:15am – 04:40pm (CT)
Future-Ready Security Strategies: Embedding Resilience Ahead of the Curve
08:15Registration & Coffee
08:50 Chairman’s Opening Address: Dr. Ed Harris, Global Director Information Security, Mauser Packaging Solutions
09:005Panel Discussion: Future-Proof OT Security: Juggling Automation, AI & Emerging Threats

  • How do you prepare your OT security program to keep pace with the increasing automation of industrial systems?
  • What steps can we take today to ensure our security strategies address the evolving threats of tomorrow?
  • How can AI be leveraged by security teams, and used offensively? What are the current limitations to this and how can these be ultimately overcome?
  • In the face of more advanced threats and a volatile geopolitical landscape, how should risk profiles and priorities shift?

Moderator: Dr. Brandy Harris, Director, CyberEd.io
Anup Singh, CISO, REV Group
Al Imran Husain, CISO, MillerKnoll
Curtis Simpson, CISO, Armis
John Mastrangeli, Cybersecurity Evangelist, Atos

.

09:40Presentation: The Funnel of Opportunity: Detecting OT Threats Before They Hit the Process

  • How attacks exploit intermediary systems to move between IT and OT
  • Practical application of the “Funnel of Opportunity” for threat detection
  • The “Theory of 99”: where threat actors spend time and how to detect them
  • Real insights from TRITON and Industroyer incident response

Chris Sistrunk, Technical Leader, ICS/OT, Google Cloud Security
.

10:10Keynote Presentation: Delivering Highly Resilient Operations Through Exposure Management For CPS

Join this session to uncover key challenges, solutions and lessons learned around:

  • Identifying attack paths with the potential to materially impact critical business processes
  • Surgically prioritizing efforts based on ability to disrupt attack paths without disrupting business operations
  • Optimizing cross-functional relationships and communicating executive-level progress and priorities

Curtis Simpson, CISO, Armis
.

10:10Break & Networking | Breakfast Hosted by Dispel (Invite-Only)
Track A
Chair: Dr. Ed Harris, Global Director Information Security, Mauser Packaging Solutions
10:50Case Study: From Foundations to Future: The Evolution of Our Cybersecurity Program

 

  • Journey through time: How our cybersecurity program has brought together IT and OT to collaborate
  • Strategic milestones: Key initiatives and decisions that shaped the program’s success
  • Challenges and lessons learned: Overcoming organizational hurdles
  • Future roadmap: Emerging priorities on the horizon
  • Advice for building a resilient security culture: Engaging stakeholders and fostering collaboration across teams

Mark Williams, IT Director, Global Networks/Telecommunications/Security/Cloud, BorgWarner

11:20Presentation: How to Build a Security Program that Encompasses IT & OT

  • Context: Renesas’s Scope
  • Challenges, both technological and physical
  • Where to start
  • Tips and tricks
  • End game

Simon Davies, Head of Information Security, Renesas Electronics – Session Sponsored by Altium

11:50Presentation: Plotting Your OT Visibility Journey

An OT visibility project is an exercise in dealing with unknown unknowns. This session provides a roadmap for the journey from spreadsheets to a centralized, real-time asset inventory that enables proactive management through the entire asset lifecycle—with recommendations on how to avoid obstacles along the way.

Mike Satzger,Director of OT/Manufacturing Solutions, ServiceNow

Track B
Chair: Scott Clayton, Sr. Manager, Manufacturing OT Security, Lucid Motors
10:50Case Study: Watch, Detect, Defend: Practical Wisdom for Securing OT Networks

This session takes a practical, first-hand look at how to build effective visibility and detection strategies across OT networks. We’ll explore what worked (and what didn’t) when implementing solutions like intrusion detection, asset inventory, and threat detection. You’ll leave with insights into:

  • Bridging the world between traditional IT networking and OT networking
  • How to approach real-time visibility in OT using principles that have worked in real-world deployments
  • Actionable steps to improve your own journey toward OT network visibility and threat awareness

Christian Harter, BISO OT & Director of OT Security and Engineering, UPS

.

11:20Presentation: Securing Manufacturing Data in the AI Era: From Governance to VDI IP Protection

In this session, we’ll explore how to build a modern, data-centric security framework tailored for critical manufacturing environments. We’ll highlight a real-world use case where a global manufacturer secured design files within Virtual Desktop Infrastructure (VDI). Learn how they enforced granular access policies, applied dynamic watermarks, and ensured full auditability – all without slowing down innovation. Key Takeaways:

  • How to govern and protect high-quality data across its lifecycle in AI-driven environments
  • Why data lineage and governance are central to future manufacturing security strategies
  • How one manufacturer secured sensitive IP in VDI without disrupting employee productivity
  • Practical steps CISOs can take to balance innovation, compliance, and IP protection

Ron Arden, EVP, CTO & COO, Fasoo

.
11:50Presentation: Maturing Your Paths to Privilege

As threats have evolved so too has Privileged Access Management (PAM). With Modern PAM considered an evolution into identity security. Identity and user management for all accounts within an organization must mature to meet the demands of the cloud, nonhuman identities, and modern attack vectors. Your PAM strategy must now manage and mitigate not only traditional privileged access (root and admin) but also attacks against identities with a path to privileged access. Join us to explore PAM evolution and to identify the key considerations you need to address in defense of your organization.
.
Christopher Hills, Chief Security Strategist, BeyondTrust
.
.
12:00Panel Discussion: Shifting Supplier Mindsets: Driving Security-by-Design in OEMs & ICS Manufacturers

  • How can asset owners effectively influence OEMs and ICS manufacturers to prioritize product security?
  • What strategies work best to encourage a long-term, security-by-design mindset among suppliers?
  • Can you share any success stories and real-world examples where OEMs have successfully integrated security features into their products?
  • Can the manufacturing industry collectively raise the security bar across the entire supply chain? How?

Moderator: Brian Jones, Senior ICS Security Manager, Avery Dennison Corporation
Steven Martano, Faculty, IANS
Ebenezer Arumai, Director, IT Infrastructure and Security, Inogen
– Ellen Boehm, SVP, IoT & AI Identity Innovation, Keyfactor
Albert Rooyakkers, SVP, Partnerships, INTEGRITY Security Services

12:40Lunch Hosted by Zscaler
Track A
Chair: Dr. Ed Harris, Global Director Information Security, Mauser Packaging Solutions
01:40 Presentation: Unified Visibility Across IT and OT: Cybersecurity for Manufacturing’s Next Chapter

In today’s manufacturing landscape, OT and IT convergence is critical for achieving operational resilience, predictive maintenance, and enhanced security. This session explores how manufacturers can gain real-time visibility across OT and IT environments, breaking down traditional silos and enabling data-driven decision-making.
We will also cover:

  • Advanced analytics and security capabilities to help optimize manufacturing processes
  • Real-world strategies for minimizing unplanned downtime
  • Integrating AI and automation into industrial systems for smarter, faster decision-making
  • Real-time monitoring to uncover process faults and supply chain challenges

Keith McClellan, Field CTO, Splunk, a Cisco Company

..
02:10 Panel Discussion: Bridging the Talent Gap: Building High-Impact, Cross-Disciplinary Security Teams

  • How are you strategically addressing the cross-disciplinary skills gap, and building teams that span networking, security, and ICS expertise?
  • When should you build internal capabilities vs. partner with external providers?
  • How can tools, automation, or services help accelerate capability building?
  • How can leaders future-proof their teams through upskilling, tooling, and organizational alignment, while ensuring they retain the talent?

Moderator: Robert Mitera, Associate Director, Global Cybersecurity Attack Surface Management, Baxter International Inc
Anup Singh, CISO, REV Group
Dr. Ed Harris, Global Director Information Security, Mauser Packaging Solutions
.

Track B
Chair: Scott Clayton, Sr. Manager, Manufacturing OT Security, Lucid Motors
01:40Presentation: Turning Insight into Impact: Rethinking AI in OT Security

This session challenges the effectiveness of AI in OT security by focusing on its real-world impact on human decision-making. It introduces a framework for evaluating intelligence tools based on whether they deliver actionable, decision-ready outputs – not just data visibility. Using the “What → So What → What Now?” model, we’ll explore how to shift from reactive triage to strategic response, helping practitioners assess whether AI is truly making systems safer and people more effective.
.
Jeff Macre, Principal Industrial Cybersecurity Solutions Architect, Darktrace
.
02:10Panel Discussion: Securing Smart Factories: Exploring the Role of Automation and AI in IT/OT Convergence

  • Smart factories: how have you been balancing security with increased connectivity, stronger reliance on automation and even the adoption of AI-driven capabilities?
  • What should a robust governance framework look like in the context of industrial cybersecurity, that allows organizations to implement new technologies securely on the shopfloor?
  • Looking at the factory of the future, what key actions are you prioritizing in your OT security programs and recommend peers do as well?

Moderator: Sankarasubramaniam Chockalingam, Principal Cybersecurity Architect, Cummins
Prasanna Ramakrishnan, CISO, Clarios
Randy Billingsley, Senior OT Controls Engineer, Ingredion
.


Chair: Dr. Ed Harris, Global Director Information Security, Mauser Packaging Solutions
02:40Roundtables: Roundtables - Join a Table and Let’s Discuss!

T1: Playbooks for Control Freaks: Your OT Security Roadmap
.
Every OT security program hits the same roadblocks: gaps in asset inventory, uncontrolled access, and flat networks. This discussion centers on the OT security journey from discovery to access control to microsegmentation with playbook strategies to cross each chasm. Together we can unlock the the secrets to securing our process control network.
.
Anusha Iyer, Founder & CEO, Corsha
.
T2: Keeping the Line Alive: Cloud Security that Keeps Production Running
.
Cloud security was meant to bring speed and flexibility, but too often it comes at the expense of control. Through this discussion we explore why misconfigurations and human errors still dominate breach reports, why remediation lags behind, and how organizations can shift from reactive firefighting to true prevention – keeping production secure and running.
.
Ariel Litmanovich, Co-Founder and CTO, Aryon Security
.
T3: How Can AI Be a Force Multiplier for Our Security Teams?
.
From your logistics portals to your “crown jewel” intellectual property, cybercriminals see manufacturers as their cash cow… And now that threat actors have AI tools on their side, the impact has become a lot more severe for many. How is it possible to keep up with threats that move at machine speed? Join us in a lively discussion about how agentic AI can build upon current SecOps structures to provide teams with 24/7 threat exposure oversight.
.
Adam LeWinter, Head of Solutions, North America, Hadrian
.
03:20Break & Networking
03:50Roundtables: Join a Table and Let’s Discuss!

T1: Patching PLCs: Why, When, and What’s at Stake
.
Patching in OT isn’t as simple as “just do it.” In this roundtable, we explore real-world scenarios where to patch or not to patch is the question. Join to learn how to evaluate when patching is necessary, how to plan for it without disrupting operations, and what alternatives exist when patching isn’t feasible.
.
Darren Lensky, Director, Information Security – Digital GRC, Amgen
.
T2: Production vs Protection: Making Smart Choices in OT
.
OT teams are under constant pressure to keep production running – often at the cost of cybersecurity. This roundtable dives into the tension between uptime and security with the goal of devising a framework for making decisions that protect both. Join to hear how other organizations are managing this balance and where they draw the line.
Moderator: Scott Clayton, Sr. Manager, Manufacturing OT Security, Information Security – Digital GRC, Lucid Motors
.
T3: Securing OT at Scale: Lessons from Architecture Assessments
.
Scaling OT cybersecurity requires architectural rigor and deep domain understanding. In this session, we’ll walk through methodologies for conducting OT architecture assessments. We’ll outline the key design principles for building resilient, segmented, and defensible OT environments – aligned with ICS-specific threat models. We’ll also examine how the “Now, Next, Never” patching framework can influence control zone design, asset prioritization, and risk tolerance. Expect real-world findings, common architectural anti-patterns, and actionable guidance for OT security architects and engineers.
.
Moderator: Pawel Martynow, Cybersecurity Manager, CC Industries
.
04:30Chairman’s Closing Remarks : Dr. Ed Harris, Global Director Information Security, Mauser Packaging Solutions
04:40End of Conference

Register Now

Choose Your Pass

Join the Line-Up

Submit a Proposal

Request a Sponsor Pack

Access Here