Event Agenda
October 21st – 22nd, 2026 // Chicago, Illinois
We are currently working on the 2026 agenda and will be updating it soon.
In the meantime, take a look at the topics and themes discussed as part of the 2025 agenda:
Theme: Progress over Perfection: Navigating the Cybersecurity Imperative While Staying Competitive
| Day 2 // October 15th 2025 08:15am – 04:40pm (CT) Future-Ready Security Strategies: Embedding Resilience Ahead of the Curve |
|
![]() |
08:15Registration & Coffee |
![]() |
08:50 Chairman’s Opening Address: Dr. Ed Harris, Global Director Information Security, Mauser Packaging Solutions |
![]() |
09:005Panel Discussion: Future-Proof OT Security: Juggling Automation, AI & Emerging Threats
– Moderator: Dr. Brandy Harris, Director, CyberEd.io |
![]() |
09:40Presentation: The Funnel of Opportunity: Detecting OT Threats Before They Hit the Process
– Chris Sistrunk, Technical Leader, ICS/OT, Google Cloud Security |
![]() |
10:10Keynote Presentation: Delivering Highly Resilient Operations Through Exposure Management For CPS Join this session to uncover key challenges, solutions and lessons learned around:
– Curtis Simpson, CISO, Armis |
![]() |
10:10Break & Networking | Breakfast Hosted by Dispel (Invite-Only) |
| Track A Chair: Dr. Ed Harris, Global Director Information Security, Mauser Packaging Solutions |
|
![]() |
10:50Case Study: From Foundations to Future: The Evolution of Our Cybersecurity Program
– Mark Williams, IT Director, Global Networks/Telecommunications/Security/Cloud, BorgWarner |
![]() |
11:20Presentation: How to Build a Security Program that Encompasses IT & OT
– Simon Davies, Head of Information Security, Renesas Electronics – Session Sponsored by Altium |
![]() |
11:50Presentation: Plotting Your OT Visibility Journey An OT visibility project is an exercise in dealing with unknown unknowns. This session provides a roadmap for the journey from spreadsheets to a centralized, real-time asset inventory that enables proactive management through the entire asset lifecycle—with recommendations on how to avoid obstacles along the way. – Mike Satzger,Director of OT/Manufacturing Solutions, ServiceNow |
| Track B Chair: Scott Clayton, Sr. Manager, Manufacturing OT Security, Lucid Motors |
|
![]() |
10:50Case Study: Watch, Detect, Defend: Practical Wisdom for Securing OT Networks This session takes a practical, first-hand look at how to build effective visibility and detection strategies across OT networks. We’ll explore what worked (and what didn’t) when implementing solutions like intrusion detection, asset inventory, and threat detection. You’ll leave with insights into:
– Christian Harter, BISO OT & Director of OT Security and Engineering, UPS . |
![]() |
11:20Presentation: Securing Manufacturing Data in the AI Era: From Governance to VDI IP Protection In this session, we’ll explore how to build a modern, data-centric security framework tailored for critical manufacturing environments. We’ll highlight a real-world use case where a global manufacturer secured design files within Virtual Desktop Infrastructure (VDI). Learn how they enforced granular access policies, applied dynamic watermarks, and ensured full auditability – all without slowing down innovation. Key Takeaways:
– Ron Arden, EVP, CTO & COO, Fasoo |
![]() |
11:50Presentation: Maturing Your Paths to Privilege As threats have evolved so too has Privileged Access Management (PAM). With Modern PAM considered an evolution into identity security. Identity and user management for all accounts within an organization must mature to meet the demands of the cloud, nonhuman identities, and modern attack vectors. Your PAM strategy must now manage and mitigate not only traditional privileged access (root and admin) but also attacks against identities with a path to privileged access. Join us to explore PAM evolution and to identify the key considerations you need to address in defense of your organization. . – Christopher Hills, Chief Security Strategist, BeyondTrust . |
| – | |
![]() |
12:00Panel Discussion: Shifting Supplier Mindsets: Driving Security-by-Design in OEMs & ICS Manufacturers
– Moderator: Brian Jones, Senior ICS Security Manager, Avery Dennison Corporation |
![]() |
12:40Lunch Hosted by Zscaler |
| Track A Chair: Dr. Ed Harris, Global Director Information Security, Mauser Packaging Solutions |
|
![]() |
01:40 Presentation: Unified Visibility Across IT and OT: Cybersecurity for Manufacturing’s Next Chapter In today’s manufacturing landscape, OT and IT convergence is critical for achieving operational resilience, predictive maintenance, and enhanced security. This session explores how manufacturers can gain real-time visibility across OT and IT environments, breaking down traditional silos and enabling data-driven decision-making. We will also cover:
– Keith McClellan, Field CTO, Splunk, a Cisco Company |
![]() |
02:10 Panel Discussion: Bridging the Talent Gap: Building High-Impact, Cross-Disciplinary Security Teams
– Moderator: Robert Mitera, Associate Director, Global Cybersecurity Attack Surface Management, Baxter International Inc |
| Track B Chair: Scott Clayton, Sr. Manager, Manufacturing OT Security, Lucid Motors |
|
![]() |
01:40Presentation: Turning Insight into Impact: Rethinking AI in OT Security This session challenges the effectiveness of AI in OT security by focusing on its real-world impact on human decision-making. It introduces a framework for evaluating intelligence tools based on whether they deliver actionable, decision-ready outputs – not just data visibility. Using the “What → So What → What Now?” model, we’ll explore how to shift from reactive triage to strategic response, helping practitioners assess whether AI is truly making systems safer and people more effective. . – Jeff Macre, Principal Industrial Cybersecurity Solutions Architect, Darktrace . |
![]() |
02:10Panel Discussion: Securing Smart Factories: Exploring the Role of Automation and AI in IT/OT Convergence
– Moderator: Sankarasubramaniam Chockalingam, Principal Cybersecurity Architect, Cummins |
| – Chair: Dr. Ed Harris, Global Director Information Security, Mauser Packaging Solutions |
|
![]() |
02:40Roundtables: Roundtables - Join a Table and Let’s Discuss! T1: Playbooks for Control Freaks: Your OT Security Roadmap . Every OT security program hits the same roadblocks: gaps in asset inventory, uncontrolled access, and flat networks. This discussion centers on the OT security journey from discovery to access control to microsegmentation with playbook strategies to cross each chasm. Together we can unlock the the secrets to securing our process control network. . – Anusha Iyer, Founder & CEO, Corsha . T2: Keeping the Line Alive: Cloud Security that Keeps Production Running . Cloud security was meant to bring speed and flexibility, but too often it comes at the expense of control. Through this discussion we explore why misconfigurations and human errors still dominate breach reports, why remediation lags behind, and how organizations can shift from reactive firefighting to true prevention – keeping production secure and running. . – Ariel Litmanovich, Co-Founder and CTO, Aryon Security . T3: How Can AI Be a Force Multiplier for Our Security Teams? . From your logistics portals to your “crown jewel” intellectual property, cybercriminals see manufacturers as their cash cow… And now that threat actors have AI tools on their side, the impact has become a lot more severe for many. How is it possible to keep up with threats that move at machine speed? Join us in a lively discussion about how agentic AI can build upon current SecOps structures to provide teams with 24/7 threat exposure oversight. . – Adam LeWinter, Head of Solutions, North America, Hadrian . |
![]() |
03:20Break & Networking |
![]() |
03:50Roundtables: Join a Table and Let’s Discuss! T1: Patching PLCs: Why, When, and What’s at Stake . Patching in OT isn’t as simple as “just do it.” In this roundtable, we explore real-world scenarios where to patch or not to patch is the question. Join to learn how to evaluate when patching is necessary, how to plan for it without disrupting operations, and what alternatives exist when patching isn’t feasible. . – Darren Lensky, Director, Information Security – Digital GRC, Amgen . T2: Production vs Protection: Making Smart Choices in OT . OT teams are under constant pressure to keep production running – often at the cost of cybersecurity. This roundtable dives into the tension between uptime and security with the goal of devising a framework for making decisions that protect both. Join to hear how other organizations are managing this balance and where they draw the line. – Moderator: Scott Clayton, Sr. Manager, Manufacturing OT Security, Information Security – Digital GRC, Lucid Motors . T3: Securing OT at Scale: Lessons from Architecture Assessments . Scaling OT cybersecurity requires architectural rigor and deep domain understanding. In this session, we’ll walk through methodologies for conducting OT architecture assessments. We’ll outline the key design principles for building resilient, segmented, and defensible OT environments – aligned with ICS-specific threat models. We’ll also examine how the “Now, Next, Never” patching framework can influence control zone design, asset prioritization, and risk tolerance. Expect real-world findings, common architectural anti-patterns, and actionable guidance for OT security architects and engineers. . – Moderator: Pawel Martynow, Cybersecurity Manager, CC Industries . |
![]() |
04:30Chairman’s Closing Remarks : Dr. Ed Harris, Global Director Information Security, Mauser Packaging Solutions |
![]() |
04:40End of Conference |